Essays about: "attackyta"

Showing result 1 - 5 of 7 essays containing the word attackyta.

  1. 1. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  2. 2. Penetration Testing of an In-Vehicle Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Andersson; [2022]
    Keywords : Cybersecurity; Penetration testing; In-Vehicle Infotainment system; Android Automotive; ISO SAE 21434; Cybersäkerhet; Penetrationstestning; Infotainmentsystem i fordon; Android Automotive; ISO SAE 21434;

    Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE

  3. 3. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  4. 4. Evaluation of security threats in microservice architectures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : William Lindblom; [2022]
    Keywords : Microservice architectures; Threat modelling; Design patterns; Mikrotjänstarkitekturer; Hotmodellering; Designmönster;

    Abstract : The microservice architecture is a popular architectural pattern in the industry to implement large systems as they can reduce the code bases of each service and increase the maintainability for each of the individual services by dividing the application into smaller components based on business logic. The services can be implemented in different programming languages and communicates over a network. READ MORE

  5. 5. Penetration testing wireless keyboards : Are your devices vulnerable?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Tomsic; [2022]
    Keywords : Wireless keyboards; penetration testing; radio frequency analysis; Crazyradio; MouseJack; Enhanced ShockBurst; Trådlösa tangentbord; penetrationstest; radiofrekvensanalys; Crazyradio; MouseJack; Enhanced ShockBurst;

    Abstract : With an ever-increasing amount of cyberespionage and cybercrime, any potential attack vector into a computer system is worthy of investigation. One such vector could be through the wireless keyboard the user themselves use and trust. READ MORE