Essays about: "Penetrationstestning"
Showing result 16 - 20 of 51 essays containing the word Penetrationstestning.
-
16. Penetration testing to improve the security position of a scale-up software company
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Micro-mobility companies have in recent years introduced electric vehicles such as bikes, scooters and mopeds as a sustainable alternative to traditional combustion engine cars in inner cities. Having electric vehicles available in the cities comes with corporate responsibilities, such as making sure the electric vehicles follow national laws regarding speed and parking. READ MORE
-
17. Cyber Security Demonstrations using Penetration Testing on Wi-Fi Cameras
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Cyber security is a rapidly changing area that contributes to people increasingly being exposed to Internet of Things (IoT). The risks of using IoT do not get enough attention from the users, nor does the supplier of the devices take full responsibility for security. READ MORE
-
18. Penetration Testing Ten Popular Swedish Android Applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE
-
19. Ethical hacking of a Smart Wi-Fi Plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE
-
20. Finding vulnerabilities in connected devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis covers the security testing of a system with connected devices. In a world with an ever-growing number of connected devices, it is crucial to be mindful of the consequences unprotected systems can cause. The thesis aim to shine light on the issues of not having sufficient security measures in place. READ MORE