Essays about: "Security testing"

Showing result 16 - 20 of 335 essays containing the words Security testing.

  1. 16. Terminating Apartheid's Atomic Bomb

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Oskar Hedman; [2023]
    Keywords : South Africa; Nuclear Disarmament; Tripart Accord; Frederik de Klerk; Nuclear Non-proliferation Treaty; Law and Political Science;

    Abstract : South Africa secretly produced six and a half nuclear weapons from 1978-1989 before undertaking a complete nuclear disarmament between 1989-1991; it is the only instance in history of when a state has discarded an indigenously developed nuclear arsenal and presents a unique case for studying the nuclear decision-making of states. This thesis is a theory-testing case study where I, by conducting a qualitative content analysis of previous research on South Africa’s nuclear rollback, examine how well Scott D Sagan’s nuclear policy model can explain the nuclear disarmament of South Africa. READ MORE

  2. 17. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  3. 18. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE

  4. 19. Ethical Hacking of a Ring Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Arnar Pétursson; [2023]
    Keywords : Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE

  5. 20. Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Burak Ünver; [2023]
    Keywords : Microservices; Security; Kubernetes; Security Scanning Tools;

    Abstract : The microservice architecture enables organizationsto shorten development cycles and deliver cloud-native applicationsrapidly. However, it also brings security concerns thatneed to be addressed by developers. Therefore, security testingin microservices becomes even more critical. READ MORE