Essays about: "Security testing"

Showing result 21 - 25 of 335 essays containing the words Security testing.

  1. 21. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Lindberg; [2023]
    Keywords : IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE

  2. 22. Multiplexing NFC Antennas : An evaluation of the technique and its limitations

    University essay from Jönköping University/JTH, Avdelningen för datavetenskap

    Author : Viktor Gustafsson; Per Ottosson; [2023]
    Keywords : AAT; BER; DSR; Impedance; Multiplexer; NFC; Wireless Technology;

    Abstract : Introduction This study aims to investigate the possibility of driving multiple NFC antennas with a single NFC-controller by using a multiplexer. An artifact was developed and experiments were conducted in order to evaluate the design choice and in addition, to observe the impact of a multiplexer in an NFC system with respect to the number of successful tag detections, bit error rate (BER), the utilization of automatic antenna tuning (AAT) and the physical distance to the NFC tag. READ MORE

  3. 23. An evaluation of Honeypots with Compliant Kubernetes

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Oscar Eriksson; [2023]
    Keywords : honeypots; Kubernetes; cloud security; compliance;

    Abstract : This thesis evaluates different honeypot technologies and how they can be integrated into Compliant Kubernetes (CK8s), a secure open-source distribution of Kubernetes designed to address various compliance and regulatory requirements. The thesis identifies and compares the features, metrics, and suitability of several candidate honeypots for CK8s based on a literature survey and experimental testing. READ MORE

  4. 24. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Muhammad Abbas Khan Abbasi; [2023]
    Keywords : Cybersecurity behavior; phishing susceptibility; cybersecurity awareness; time pressure; the human factor;

    Abstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE

  5. 25. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE