Essays about: "penetration test"
Showing result 6 - 10 of 99 essays containing the words penetration test.
-
6. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
7. Modeling and Simulation for Forward Arming and Refueling Points : Enhancing efficiency and Decision- making in Military Operations
University essay from FörsvarshögskolanAbstract : This master’s thesis explores the application of Modeling and Simulation (M&S) techniques in military operations involving Forward Arming and Refueling Points (FARP). FARPs play a crucial role in supporting aircraft operations by facilitating deep penetration into enemy territory and ensuring sustained presence in the Area of Operation (AOO). READ MORE
-
8. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
9. Penetration testing of a smart speaker
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. READ MORE
-
10. Underneath the Surface : Threat modeling and penetration testing of a submarine robot
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Connected devices have become an integral part of life in modern society. In the industry, several tasks have been automatized and are now performed by robots, a development that is called Industry 4.0. READ MORE