Essays about: "avlyssning"

Showing result 1 - 5 of 16 essays containing the word avlyssning.

  1. 1. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  2. 2. Quantum Espionage

    University essay from KTH/Tillämpad fysik

    Author : Carlo Ninic Svensson; [2023]
    Keywords : Quantum Nano Photonics; SNSPD; OTDR; Nano Kvantfotonik; SNSPD; OTDR;

    Abstract : This thesis investigates the security of optical fiber communication and demonstrates the feasibility of eavesdropping using different tapping methods and superconducting nanowire single-photon detectors (SNSPDs). Methods for surveillance against fiber intrusion are also investigated. READ MORE

  3. 3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Maha Ghunaim; [2023]
    Keywords : Smart Homes; Smart Home Devices; Home Automation; User Behavior; Internet of Things IoT ; Smarta hem; smarta hemenheter; hemautomation; användarbeteende; internet av Saker IoT ; المنازل الذكية ، أجهزة المنزل الذكي ، أتمتة المنزل ، سلوك المستخدم ، إنترنت أشياء إنترنت الأشياء ;

    Abstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE

  4. 4. Penetration testing of a smart speaker

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amin Nouiser; [2023]
    Keywords : Penetration testing; Ethical hacking; Smart speaker; Cybersecurity; Internet of Things; Penetrationstestning; Etisk hackning; Smart högtalare; Cybersäkerhet; Sakernas Internet;

    Abstract : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. READ MORE

  5. 5. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE