Essays about: "mobile threats"

Showing result 11 - 15 of 59 essays containing the words mobile threats.

  1. 11. Penetration testing of Android applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Nilsson; [2020]
    Keywords : Ethical hacking; penetration testing; Android application security; reverse engineering; threat modeling; Etisk hacking; penetrationstest; Android-applikationssäkerhet; baklängeskonstruktion; hotmodellering;

    Abstract : The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. READ MORE

  2. 12. Security Auditing and Testing of two Android Client-Server Applications

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Matilda Engström Ericsson; [2020]
    Keywords : Security audit; Security testing; Android Client-Server; OWASP Top 10 Mobile Risks; Automated tools; MITM attack; SSL; Authorization;

    Abstract : How secure is your application? How can you evaluate if it is secure? The threats are many and may be hard to find. In a world where things are more and more automated; how does manual labour contribute to security auditing applications? This study aims to assess two proof of concept Android client-server applications, developed by students to suit the needs of a fictitious Police Department and Fire Department, respectively. READ MORE

  3. 13. Jaguar (Panthera onca) and puma (Puma concolor) hunting preferences, and their effect on cattle (Bos taurus), in Pantanal, Brazil

    University essay from SLU/Dept. of Animal Breeding and Genetics

    Author : Agnes Fridell; [2020]
    Keywords : Panthera onca; Puma concolor; Bos taurus; ; Bos indicus; Pantanal; Brazil;

    Abstract : In Brazil, jaguars and pumas both constitute threats to cattle farming due to predation on calves. Since both jaguar and puma populations decline, con-flicts with humans should be avoided in order to prevent poaching, which can lead to the number of wild cats in Brazil decreasing further. READ MORE

  4. 14. Ethical Hacking of a Robot Vacuum Cleaner

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christoffer Torgilsman; Eric Bröndum; [2020]
    Keywords : IoT; Ethical Hacking; Penetration testing; Threat Model; Security; DREAD; STRIDE; Encryption; MQTT; Ironpie m6;

    Abstract : This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cleaner Ironpie m6 is. The method is based on threat modeling the device, using the DREAD and STRIDE models. READ MORE

  5. 15. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daria Galal; Martin Tillberg; [2020]
    Keywords : izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE