Advanced search

Showing result 16 - 20 of 59 essays matching the above criteria.

  1. 16. Assessing the security of a Garmin Smartwatch through Ethical hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lucas Manfredh; [2022]
    Keywords : Security; Privacy; Bluetooth; Smartwatch; Ethical hacking; Säkerhet; Integritet; Bluetooth; Smartklocka; Etisk hacking;

    Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE

  2. 17. Ethical hacking of Sennheiser smart headphones

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fuhao Huang; [2022]
    Keywords : Ethical hacking; smart headphones; Bluetooth; cyber security; Internet of Things; Etisk hackning; smarta hörlurar; Bluetooth; cybersäkerhet; Internet of Things;

    Abstract : The proliferation of IoT devices has brought our world closer than ever. However, because these devices can connect to the internet, they are also vulnerable to cyberattacks. IoT devices collect our personal information, so we must take IoT security seriously to protect our privacy. READ MORE

  3. 18. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  4. 19. Awareness-Raising and Prevention Methods of Social Engineering for Businesses and Individuals

    University essay from

    Author : Dominik Harth; Emanuel Duernberger; [2022]
    Keywords : IT security; social engineering; bypass security systems; ethics psychology; guidelines; phishing; human hacking; information security;

    Abstract : A system is only as secure as the weakest link in the chain. Humans are the binding link between IT (information technology) security and physical secu-rity. READ MORE

  5. 20. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Tobias Dahlberg Sundström; Johan Nilsson; [2022]
    Keywords : Ethical hacking; IoT; DREAD; STRIDE; Grey-box testing; Robot vacuum; Etiskt hackande; IoT; DREAD; STRIDE; Grey-box testande; Robotdammsugare;

    Abstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE