Essays about: "mobile threats"

Showing result 6 - 10 of 59 essays containing the words mobile threats.

  1. 6. Penetration Testing Ten Popular Swedish Android Applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Astély; Johan Ekroth; [2022]
    Keywords : Penetration testing; Android; vulnerabilities; exploitation; mobile security; penetrationstest; Android; sårbarheter; exploatering; mobilsäkerhet;

    Abstract : As more services previously conducted physically are being conducted on mobiles, the security of mobile applications has become a more important part of the development. These mobile applications may handle sensitive information for the user such as payment data, health data, and other information that can have value for malicious actors. READ MORE

  2. 7. Privacy Enhancing Data Reporting System For Participatory Sensing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tomasz Czajęcki; [2022]
    Keywords : Participatory sensing; data aggregation; MPC; Bluetooth; Participatory sensing; data aggregation; MPC; Bluetooth;

    Abstract : Privacy is a crucial aspect of any system involving user-supplied data. There exist multiple approaches to protecting the identity and secrecy of users in data submission systems. In this thesis, I consider the case of privacy-enhancing of data reporting in Participatory Sensing systems. READ MORE

  3. 8. Ethical Hacking of a Smart Video Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xin Liu; [2021]
    Keywords : smart video doorbell; IoT; security; penetration testing; threat modeling; smart video dörrklocka; IoT; säkerhet; penetrationstestning; hotmodellering;

    Abstract : With the rapid development of IoT, more and more cyber security threats occur in people’s lives. In addition, many IoT devices are closely related to lives and have a large number of users, such as smart home. Therefore, it is more worthy for the adversaries to launch attacks. READ MORE

  4. 9. MACHINE LEARNING ASSISTED MULTI-CELL BASE STATION SLEEP MODE MANAGEMENT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mert Özdemir; [2021]
    Keywords : ;

    Abstract : Fifth generation (5G) communication technology provides higher data rates, better connectivity, and many new facilities. However, there are some challenges that need to be addressed. READ MORE

  5. 10. How Secure are you Online? : A Cybersecurity Assessment of the Recommendations Provided to Swedish Citizens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Nikolaos Papadopoulos; [2021]
    Keywords : cybersecurity; recommendations; citizen; individuals; cyber threat landscape;

    Abstract : With computers, mobile phones and other smart devices being an increasingly part of peoples lives. It is important now, more than ever that people know how to operate them safely and stay protected in the cyber landscape. For citizens to understand how to stay protected online, it is important to understand what to stay safe from. READ MORE