Advanced search

Found 3 essays matching the above criteria.

  1. 1. Assessing the threat posed by USB devices

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Christopher Ekström; [2022]
    Keywords : ;

    Abstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE

  2. 2. Ethical Hacking of Android Auto in the Context of Road Safety

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Palm; Benjamin Gafvelin; [2021]
    Keywords : Android Auto Security; Infotainment System; Road Safety; Penetration Testing; Malicious Apps; Android Security; ; Android Auto Säkerhet; Infotainment-system; Vägsäkerhet; Penetrationstest; Skadliga Appar; Android Säkerhet; ;

    Abstract : With a more than ever increasing demand to interconnect smartphones with infotainment systems, Android Auto has risen in popularity with its services used in modern vehicles worldwide. However, as users progressively connect their smartphones to in-vehicle infotainment systems, the opportunity for malicious actors to endanger and access private data of Android Auto users advances as well. READ MORE

  3. 3. The Effectiveness of Social Engineering as a Cyber - Attacking Vector : People Do Use Unknown USB Drive, They Find

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Isaac Yaw Ferguson; [2017]
    Keywords : Social engineering; IT security; USB hacking;

    Abstract : Information security importance is rising. Information security awareness' is spreading, and this gives a clear picture of the growing demand for information security. Information security does not only consist of essential information but also the customer. An information system could be either a system user or a device. READ MORE