Essays about: "security device thesis"

Showing result 16 - 20 of 168 essays containing the words security device thesis.

  1. 16. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  2. 17. Preparing for the Unexpected : Guidelines for Industrial IoT Forensics Readiness

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Paolo Molinaro; Raya Wagner; [2023]
    Keywords : digital forensics readiness; industrial internet of things;

    Abstract : The Industrial Internet of Things (IIoT) plays a critical role in modern industrial systems, contributing to increased efficiency, productivity, and innovation. However,its rapid evolution and the complexity of devices pose significant challenges to digital forensics readiness (DFR). READ MORE

  3. 18. Assessing the security of a Garmin Smartwatch through Ethical hacking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lucas Manfredh; [2022]
    Keywords : Security; Privacy; Bluetooth; Smartwatch; Ethical hacking; Säkerhet; Integritet; Bluetooth; Smartklocka; Etisk hacking;

    Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE

  4. 19. Assessing the threat posed by USB devices

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Christopher Ekström; [2022]
    Keywords : ;

    Abstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE

  5. 20. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Marcus Lenander; Jakob Tigerström; [2022]
    Keywords : Software vulnerability management; vulnerability prioritisation; CVSS; environmental metrics; cyber security; Hantering av sårbarhet i programvara; prioritering av sårbarheter; CVSS; Miljömetrik; cybersäkerhet;

    Abstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE