Essays about: "attackyta"
Showing result 1 - 5 of 7 essays containing the word attackyta.
-
1. A cybersecurity audit of the Garmin Venu
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE
-
2. Penetration Testing of an In-Vehicle Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE
-
3. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE
-
4. Evaluation of security threats in microservice architectures
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The microservice architecture is a popular architectural pattern in the industry to implement large systems as they can reduce the code bases of each service and increase the maintainability for each of the individual services by dividing the application into smaller components based on business logic. The services can be implemented in different programming languages and communicates over a network. READ MORE
-
5. Penetration testing wireless keyboards : Are your devices vulnerable?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With an ever-increasing amount of cyberespionage and cybercrime, any potential attack vector into a computer system is worthy of investigation. One such vector could be through the wireless keyboard the user themselves use and trust. READ MORE
