Advanced search
Showing result 1 - 5 of 20 essays matching the above criteria.
-
1. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
2. Cybersecurity Evaluation of an IP Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE
-
3. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE
-
4. Awareness-Raising and Prevention Methods of Social Engineering for Businesses and Individuals
University essay fromAbstract : A system is only as secure as the weakest link in the chain. Humans are the binding link between IT (information technology) security and physical secu-rity. READ MORE
-
5. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
University essay from KTH/Hälsoinformatik och logistikAbstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE