Essays about: "attackyta"

Showing result 1 - 5 of 8 essays containing the word attackyta.

  1. 1. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  2. 2. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  3. 3. Penetration Testing of an In-Vehicle Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Andersson; [2022]
    Keywords : Cybersecurity; Penetration testing; In-Vehicle Infotainment system; Android Automotive; ISO SAE 21434; Cybersäkerhet; Penetrationstestning; Infotainmentsystem i fordon; Android Automotive; ISO SAE 21434;

    Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE

  4. 4. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  5. 5. Evaluation of security threats in microservice architectures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : William Lindblom; [2022]
    Keywords : Microservice architectures; Threat modelling; Design patterns; Mikrotjänstarkitekturer; Hotmodellering; Designmönster;

    Abstract : The microservice architecture is a popular architectural pattern in the industry to implement large systems as they can reduce the code bases of each service and increase the maintainability for each of the individual services by dividing the application into smaller components based on business logic. The services can be implemented in different programming languages and communicates over a network. READ MORE