Essays about: "security exploit"
Showing result 1 - 5 of 105 essays containing the words security exploit.
-
1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE
-
2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
3. Recognizing and Defending Against Phishing Attacks in Large Organizations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE
-
4. Harnessing Hydrogen and Batteries: Hybrid Energy Storage System for Versatile and Profitable Renewable Power Production
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : This thesis explores the integration of hydrogen and battery energy storage systems as a means to enhance the management of wind and solar power in the pursuit of a greener grid. The objective of the study is to identify the potential benefits and challenges associated with hybrid energy storage systems (HESS) and their role in renewable energy integration. READ MORE
-
5. Vulnerability Management of Open-Source Libraries
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE