Essays about: "Threat model"

Showing result 16 - 20 of 368 essays containing the words Threat model.

  1. 16. An Ontology and Guidelines for Cybersecurity Risk Assessment in the Automotive Domain

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Karim Khalil; [2023]
    Keywords : ISO SAE 21434; Threat Analysis and Risk Assessment; Ontology; Cybersecurity Concept;

    Abstract : This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assessment activities in the automotive domain. The focus of the paper is to model how the standard views the tasks of Threat Analysis and Risk Assessment (TARA) and cybersecurity concept. READ MORE

  2. 17. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE

  3. 18. Anticipating Glacier Lake Outburst Floods (GLOFs): an impact-based forecasting framework for managing GLOF risks in Nepal.

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Grace Muir; [2023]
    Keywords : Anticipatory Action; Impact-based Forecasting; Glacier Lake Outburst Flood; Nepal; Risk-informed Early Action; Prediction; Disaster Risk Management; Science General;

    Abstract : Glacier lake outburst floods (GLOFs) are an increasingly documented threat across the Himalayan region, wherein Nepal is situated. GLOFs involve a rapid discharge of water from a lake situated at the side, front, within, beneath, or on the surface of a glacier. READ MORE

  4. 19. Ethical Hacking of a Ring Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Arnar Pétursson; [2023]
    Keywords : Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE

  5. 20. Effects of summer peaks on brown trout and Atlantic salmon growth and survival in hydropower-regulated Gullspång River

    University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)

    Author : Oscar Hallberg; [2023]
    Keywords : hydropeaking; hydropower; fish; salmon; salmo salar; salmo trutta; summer; survival; growth; parr; fry; korttidsreglering; vattenkraft; salmonid; salmo salar; salmo trutta; tillväxt; överlevnad; lax; öring;

    Abstract : Daily demands for electrical power are met through sub-daily release of turbined water in the form of hydropeaking. Hydropeaking’s changes to stream flow are listed as a threat to biodiversity in river ecosystems as it causes rapid habitat alteration such as increased depth and velocity, affecting the species living downstream. READ MORE