Essays about: "säkerhetsrisker"

Showing result 1 - 5 of 40 essays containing the word säkerhetsrisker.

  1. 1. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint

    University essay from KTH/Hälsoinformatik och logistik

    Author : Marius Seffer; [2023]
    Keywords : ethical hacking; Internet of Things; security; smart home; threat modeling; economy; etisk hackning; Internet of Things; säkerhet; smarta hem; hotmodellering; ekonomi;

    Abstract : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. READ MORE

  2. 2. A cybersecurity audit of the Garmin Venu

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oliver Antal; [2023]
    Keywords : IoT wearables; cybersecurity; penetration testing; sniffing; fuzzing; sakernas internet bärbara enheter; cybersäkerhet; intrångstestning; avlyssning; störningsattacker;

    Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE

  3. 3. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Lindberg; [2023]
    Keywords : IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE

  4. 4. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  5. 5. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elias Bonnici; [2023]
    Keywords : Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE