Essays about: "Penetrationstestning"

Showing result 16 - 20 of 51 essays containing the word Penetrationstestning.

  1. 16. Penetration testing to improve the security position of a scale-up software company

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yosef Amin; Bength Roland Pappila; [2022]
    Keywords : penetration testing; ethical hacking; threat modeling; IoT; micro-mobility; penetrationstestning; etisk hackning; hotmodellering; IoT; mikrorörlighet;

    Abstract : Micro-mobility companies have in recent years introduced electric vehicles such as bikes, scooters and mopeds as a sustainable alternative to traditional combustion engine cars in inner cities. Having electric vehicles available in the cities comes with corporate responsibilities, such as making sure the electric vehicles follow national laws regarding speed and parking. READ MORE

  2. 17. Cyber Security Demonstrations using Penetration Testing on Wi-Fi Cameras

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Hanna Gustafsson; Hanna Kvist; [2022]
    Keywords : Cyber Security; Education; Demonstration; Wi-Fi Camera; Vulnerability; IoT; Penetration Testing;

    Abstract : Cyber security is a rapidly changing area that contributes to people increasingly being exposed to Internet of Things (IoT). The risks of using IoT do not get enough attention from the users, nor does the supplier of the devices take full responsibility for security. READ MORE

  3. 18. Penetration Testing Ten Popular Swedish Android Applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Astély; Johan Ekroth; [2022]
    Keywords : Penetration testing; Android; vulnerabilities; exploitation; mobile security; penetrationstest; Android; sårbarheter; exploatering; mobilsäkerhet;

    Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE

  4. 19. Ethical hacking of a Smart Wi-Fi Plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Markus Newton Hedelin; Marcus Samuelsson; [2022]
    Keywords : Bachelor’s thesis; Ethical hacking; Penetration testing; Internet of things; Smart plug; Mobile application; Cloud service; Kandidatexamensarbete; Etisk hackning; Penetrationstestning; Sakernas internet; Smart uttag; Mobilapplikation; Molntjänst;

    Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE

  5. 20. Finding vulnerabilities in connected devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matilda Qvick; Saga Harnesk; [2022]
    Keywords : Penetration Testing; Threat Modelling; Connected Devices; Vulnerabilities; Hardware Security; Penetrationstestning; Hotmodellering; Uppkopplade Enheter; Sårbarheter; Hårdvarusäkerhet;

    Abstract : This thesis covers the security testing of a system with connected devices. In a world with an ever-growing number of connected devices, it is crucial to be mindful of the consequences unprotected systems can cause. The thesis aim to shine light on the issues of not having sufficient security measures in place. READ MORE