Essays about: "denial-of-service attacks"

Showing result 6 - 10 of 78 essays containing the words denial-of-service attacks.

  1. 6. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ramtin Erfani Torbaghani; [2023]
    Keywords : Cyber Security; Cyber Threat; Perception; Cyber Attack; Ransomware; Malware; Phishing; Packet Sniffing; Denial of Service; Insecure Passwords; IoT; Vulnerability Scanning; Brute Force Attacks; Awareness; Behaviour; Familiarity; University Students;

    Abstract : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. READ MORE

  2. 7. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  3. 8. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  4. 9. Ethical Hacking of a Virtual Reality Headset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olivia Höft; [2023]
    Keywords : Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE

  5. 10. Mitigating HTTP Denial-of-Service Attacks on Self-Hosted Web Applications

    University essay from KTH/Datavetenskap

    Author : William Berg; Gustav Henningsson; [2022]
    Keywords : ;

    Abstract : Denial-of-service (DoS) attacks are a common threat to any resource on the internet, making knowledge regarding how to prevent them increasingly valuable. In this paper we have investigated different HTTP DoS attacks, how they affect web servers, and what steps one might take to protect a self-hosted web application from such attacks. READ MORE