Essays about: "hacking"
Showing result 1 - 5 of 130 essays containing the word hacking.
-
1. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint
University essay from KTH/Hälsoinformatik och logistikAbstract : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. READ MORE
-
2. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE
-
3. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
4. Ethical Hacking of a Ring Doorbell
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE
-
5. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE
