Essays about: "hacking"

Showing result 1 - 5 of 48 essays containing the word hacking.

  1. 1. Sovereignty in Cyberspace A study on Customary International Law on the Principle of Sovereignty

    University essay from Göteborgs universitet/Juridiska institutionen

    Author : Sam Safi; [2020-05-17]
    Keywords : Customary International La; Cyberspace; Sovereignty;

    Abstract : The global expansion of the internet has enabled the emergence of a relatively new theatre of inter-state conflicts; the domain of cyberspace. The emergence of cyberspace poses great challenges to the territorial understanding of the world order and raises important questions about fundamental concepts of international law. READ MORE

  2. 2. Elaborate Operational Requirements to Address Reward Hacking in Reinforcement Learning Agents

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Sina Yaghoobzadehtari; Colin Owusu Adomako; Siavash Paidar; [2019-11-18]
    Keywords : ;

    Abstract : Autonomous agents, in recent times have been used to addressseveral problems, but these agents in their course of achievingtheir task also emit side effects to the environment in which theyoperate. Paramount of these side effects is reward hacking. Inthis report, we try to address reward hacking using elaborateoperational requirements. READ MORE

  3. 3. Implementing a Nudge to Prevent Email Phishing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Viktor Vitek; Taqui Syed Shah; [2019]
    Keywords : Hacking; Phishing; Social Engineering; Psychology; Nudge; ; Dataintrång; Nätfiske; Social Manipulation; Psykologi; Nudge; ;

    Abstract : Phishing is a reoccurring issue, which uses social engineering as an attack strategy. The prevention of these attacks is often content-based filters. These solutions are however not always perfect, and phishing emails can still be able to get through the filters. We suggest a new strategy to combat phishing. READ MORE

  4. 4. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Robberts; Joachim Toft; [2019]
    Keywords : ethical hacking; penetration testing; electronic locks; internet of things; iot; threat modeling; security; etisk hacking; penetrationstestning; elektroniska lås; sakernas internet; iot; hotmodellering; säkerhet;

    Abstract : Internet of Things (IoT) devices are becoming more ubiquitous than ever before, and while security is not that important for every type of device, it is crucial for some. In this thesis, a widely available Bluetooth smart lock is examined through the lens of security. READ MORE

  5. 5. Haxonomy : A Taxonomy for Web Hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Körlinge; [2019]
    Keywords : ;

    Abstract : This study aims to show that the information present in public vulnerability reports from bug bounty programs can be utilized to provide aid for individual security researchers when performing their research. This is done here by creating a taxonomy based on the attack surfaces on a website that were used by the author of a report when discovering a vulnerability. READ MORE