Essays about: "säkerhet sårbarheter"

Showing result 1 - 5 of 72 essays containing the words säkerhet sårbarheter.

  1. 1. Security evaluation of the Matrix Server-Server API

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hîvron Stenhav; [2023]
    Keywords : Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE

  2. 2. Automated Vulnerability Management

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yuhan Ma; [2023]
    Keywords : Software security; Machine learning; Automation; Vulnerability management; Natural language processing; Programvarusäkerhet; Maskininlärning; Automation; Sårbarhetshantering; Bearbetning av naturligt språk;

    Abstract : The field of software security is constantly evolving, and security must be taken into consideration throughout the entire product life cycle. This is particularly important in today’s dynamic security landscape, where threats and vulnerabilities constantly change. READ MORE

  3. 3. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yaqi Tian; [2023]
    Keywords : Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE

  4. 4. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  5. 5. Exploring the Security Implications of a Decentralized Internet : Vulnerabilities in Web3 and Blockchain-Based Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Blondell; [2023]
    Keywords : Blockchain; Web3; security; smart contracts; vulnerabilities; Blockchain; säkerhet; Web3; smart-contracts; sårbarheter;

    Abstract : The internet has evolved from an information-based reading platform to a read-and-write platform which is dominated by a handful of organizations. This centralization has led to a movement suggesting a new shift using blockchain technology to create a decentralised internet. READ MORE