Essays about: "Security Misconfiguration"
Found 5 essays containing the words Security Misconfiguration.
-
1. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
2. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE
-
3. Automating the basic configuration of IPMI interfaces : To reduce the risk of misconfiguration
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : In this report the lack of basic security of IPMI devices when freshly received from the manufacturer will be discussed and analysed. Furthermore, the rest of the report will focus on attempting to find a solution on how to automate configuration of IPMI devices (and iDRACs due to hardware being borrowed from Ericsson Linköping) to avoid misconfigurations and to change the default credentials shipped. READ MORE
-
4. Check Yourself Before You Wreck Yourself- A study of how to assess security vulnerabilities of web servers through configuration analysis
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The web server is an essential component of many systems today. It has the possibility to give access to files with sensitive information and it is the backbone that enable a vast amount of applications. READ MORE
-
5. Creating a Secure Server Architecture and Policy for Linux-based Systems
University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)Abstract : Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vulnerabilities in order to penetrate into the system internals and cause damage. READ MORE