Essays about: "Penetrationstestning"

Showing result 11 - 15 of 51 essays containing the word Penetrationstestning.

  1. 11. Penetration Testing of an In-Vehicle Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Andersson; [2022]
    Keywords : Cybersecurity; Penetration testing; In-Vehicle Infotainment system; Android Automotive; ISO SAE 21434; Cybersäkerhet; Penetrationstestning; Infotainmentsystem i fordon; Android Automotive; ISO SAE 21434;

    Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE

  2. 12. Determining whether the Hövding bicycle airbag is secure against cyber attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Henrik Mellin; [2022]
    Keywords : Penetrationtesting; Internet of Things; Threatmodeling; BluetoothLowEnergy; Firmware analysis; Reverse engineering; Penetrationstestning; Sakernasinternet; Hotmodellering; BluetoothLowEnergy; Analys of fast programvara; Baklängeskonstruktion;

    Abstract : This thesis is about cyber-security and penetration testing. More specifically it concerns penetration testing of a Hövding bicycle airbag which is a smart alternative to a traditional bicycle helmet. The thesis focuses on exploiting Bluetooth Low Energy, firmware analysis and reverse engineering. READ MORE

  3. 13. Ethical hacking of Sennheiser smart headphones

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fuhao Huang; [2022]
    Keywords : Ethical hacking; smart headphones; Bluetooth; cyber security; Internet of Things; Etisk hackning; smarta hörlurar; Bluetooth; cybersäkerhet; Internet of Things;

    Abstract : The proliferation of IoT devices has brought our world closer than ever. However, because these devices can connect to the internet, they are also vulnerable to cyberattacks. IoT devices collect our personal information, so we must take IoT security seriously to protect our privacy. READ MORE

  4. 14. SIPman : A penetration testing methodology for SIP and RTP

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Elin Wallgren; Christoffer Willander; [2022]
    Keywords : Session Initiation Protocol; Real-time Transport Protocol; penetration testing; methodology; Voice over IP; Session Initiation Protocol; Real-time Transport Protocol; penetrationstestning; metod; Voice over IP;

    Abstract : Background. SIP and RTP are two protocols that are widely used, and they play an important role in VoIP services. VoIP is an integral part of many communication services, e.g. READ MORE

  5. 15. Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Albin Winkelmann; [2022]
    Keywords : IoT; threat modeling; computer security; smart lock; pentesting; IoT; hotmodellering; datasäkerhet; smarta lås; penetrationstestning;

    Abstract : IoT devices have become more common in our everyday lives as they provide more useful features than traditional devices. One such device is the smart door lock, which enables homeowners to grant access on a user-specified level through digital keys and remote operation. READ MORE