Essays about: "bypass security systems"

Showing result 1 - 5 of 10 essays containing the words bypass security systems.

  1. 1. Evaluating Connectivity for RabbitMQ stream clients in front of Load Balancers

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Hanna Littorin; [2024]
    Keywords : ;

    Abstract : Message brokers play a crucial role in decoupling senders and receivers within distributed systems. In some scenarios, it is necessary to distribute a message broker across multiple nodes to form a cluster. To ensure even and fair distribution of client requests across nodes, load balancers are commonly employed in front of the cluster. READ MORE

  2. 2. Awareness-Raising and Prevention Methods of Social Engineering for Businesses and Individuals

    University essay from

    Author : Dominik Harth; Emanuel Duernberger; [2022]
    Keywords : IT security; social engineering; bypass security systems; ethics psychology; guidelines; phishing; human hacking; information security;

    Abstract : A system is only as secure as the weakest link in the chain. Humans are the binding link between IT (information technology) security and physical secu-rity. READ MORE

  3. 3. Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Axel Lindeberg; [2021]
    Keywords : penetration testing; threat modeling; IoT; computer security; home alarm system; penetrationstestning; hotmodellering; IoT; datasäkerhet; hemlarmsystem;

    Abstract : The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. READ MORE

  4. 4. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  5. 5. Investigating Attacks on Vehicular Platooning and Cooperative Adaptive Cruise Control

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Konstantinos Kalogiannis; [2020]
    Keywords : V2V security; Injection Attacks; CACC; Anomaly Detection; V2V säkerhet; Falsifieringsattacker; CACC; Avvikelse Upptäckt;

    Abstract : Autonomous vehicles are a rising technology that aims to change the way people think about mobility in the future. A crucial step towards that goal is the assurance that malicious actors cannot instigate accidents that could lead to damages or loss of life. READ MORE