Essays about: "ethical hacking"
Showing result 11 - 15 of 59 essays containing the words ethical hacking.
-
11. Designing a solution for automating the management of a capture the flag network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Everyday one hears about another cyber attack against a company or state. In 2023 the cost of cyber crime reached 8 trillion USD and is expected to reach 10 trillion in 2025 [1]. It is becoming increasingly clear that cyber security is important in modern society and especially in the IT industry. READ MORE
-
12. Ethical Hacking of a Virtual Reality Headset
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE
-
13. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE
-
14. Cybersecurity Evaluation of an IP Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE
-
15. Evaluating the Security and Resilience of Typical off the Shelf CoAP IoT Devices : Assessing CoAP and Wi-Fi vulnerabilities
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Syftet med denna studie har varit att utvärdera säkerheten och motståndskraften hos CoAP-protokollet som används av ett multinationellt företag för kommunikationen mellan en gateway och appen för kontroll av smarta produkter. Utvärderingen började med att koppla gatewayn till nätverket och installera operativsystemet Kali Linux på datorn. READ MORE