Essays about: "Penetrationstestning"

Showing result 1 - 5 of 30 essays containing the word Penetrationstestning.

  1. 1. Penetration Testinga Saia Unit : A Control System for Water, Ventilation, and Heating in Smart Buildings

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elvira Dzidic; Benjamin Jansson Mbonyimana; [2021]
    Keywords : Smart Buildings; IoT; Saia; Penetration Testing; Security; Smarta Byggnader; IoT; Saia; Penetrationstestning; Säkerhet;

    Abstract : The concept of Smart Buildings and automated processes is a growing trend. Due to a rapidly growing market of buildings that relies on the Internet, improper security measures allow hackers to gain control over the whole system easily and cause devastating attacks. READ MORE

  2. 2. Are modern smart cameras vulnerable to yesterday’s vulnerabilities? : A security evaluation of a smart home camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jesper Larsson; [2021]
    Keywords : Security; Penetration testing; Threat modelling; Internet of things; Smart cameras; Säkerhet; penetrationstestning; hotmodellering; Sakernas internet; Smarta kameror;

    Abstract : IoT cameras can allow users to monitor their space remotely, but consumers are worried about the security implications. Their worries are neither unfounded as vulnerabilities repeatedly have been found in internet connected cameras. READ MORE

  3. 3. How Secure are Drones? : A security analysis of a drone system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pebo Hamza; Ahmmad Qassim; [2021]
    Keywords : Drone; UAV; hacking; security; threat modeling; penetration testing; Drön; UAV; hacking; säkerhet; hotmodellering; penetrationstestning;

    Abstract : Drones are a crucial part of our future society. They are a part of the recent autonomous revolution that has been initiated by AI. Drone adoption in the commercial sector is ever-growing. If we are to make these devices a part of our critical infrastructure, then we should ensure that they are secure from malicious actors who seek to exploit them. READ MORE

  4. 4. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rafi Aram Yadward Malkhasian; [2021]
    Keywords : ;

    Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE

  5. 5. Security Analysis of Microservice Choices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daniel Dannberg; [2021]
    Keywords : Threat modeling; Security; Microservices; The Common Misuse Scoring System; National Institute of Standards and Technology; Return Of Security Investment; Hotmodellering; Säkerhet; Mikrotjänster; Säkerhetsinvestering; Evaluering av säkerhet;

    Abstract : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. READ MORE