Essays about: "security device thesis"
Showing result 16 - 20 of 168 essays containing the words security device thesis.
-
16. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE
-
17. Preparing for the Unexpected : Guidelines for Industrial IoT Forensics Readiness
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The Industrial Internet of Things (IIoT) plays a critical role in modern industrial systems, contributing to increased efficiency, productivity, and innovation. However,its rapid evolution and the complexity of devices pose significant challenges to digital forensics readiness (DFR). READ MORE
-
18. Assessing the security of a Garmin Smartwatch through Ethical hacking
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE
-
19. Assessing the threat posed by USB devices
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE
-
20. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE