Essays about: "Security Misconfiguration"

Found 5 essays containing the words Security Misconfiguration.

  1. 1. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  2. 2. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE

  3. 3. Automating the basic configuration of IPMI interfaces : To reduce the risk of misconfiguration

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Mark Jack Sundahl; [2020]
    Keywords : ;

    Abstract : In this report the lack of basic security of IPMI devices when freshly received from the manufacturer will be discussed and analysed. Furthermore, the rest of the report will focus on attempting to find a solution on how to automate configuration of IPMI devices (and iDRACs due to hardware being borrowed from Ericsson Linköping) to avoid misconfigurations and to change the default credentials shipped. READ MORE

  4. 4. Check Yourself Before You Wreck Yourself- A study of how to assess security vulnerabilities of web servers through configuration analysis

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Ingrid Hyltander; [2019]
    Keywords : Software Vulnerabilities; Security Misconfiguration; Configuration Analysis; Web Server; Apache; Nginx; Technology and Engineering;

    Abstract : The web server is an essential component of many systems today. It has the possibility to give access to files with sensitive information and it is the backbone that enable a vast amount of applications. READ MORE

  5. 5. Creating a Secure Server Architecture and Policy for Linux-based Systems

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Marios Kourtesis; [2015]
    Keywords : IDS; secure environments; Linux; network management systems; server security; web application firewall; server security;

    Abstract : Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. READ MORE