Essays about: "spoofing"
Showing result 21 - 25 of 49 essays containing the word spoofing.
-
21. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE
-
22. Exploring Ethical Hacking by Identifying Vulnerabilities in Motorola BabyMonitor MBP855CONNECT(4855)
University essay from KTH/Medicinteknik och hälsosystemAbstract : As IoT is implemented into more of our daily-use devices, so too should the understanding of potential risks caused by interconnectivity. Securing an IoT device is no simple feat, it is therefore important to understand the complexities of cyber security. READ MORE
-
23. How mail components on the server side detects and process undesired emails : a systematic literature review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As the use of emails increases constantly every year, so do the reports of various victims in society, on companies and individuals who have been affected by these undesirable emails in the form of spam, spoofing and phishing in their inbox. The effect of undesirable emails are many, but in summary, they cost the society and organization immense amount of money. READ MORE
-
24. Detecting ADS-B spoofing attacks : using collected and simulated data
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In a time where general technology is progressing at a rapid rate, this thesis aims to present possible advancements to security in regard to air traffic communication. By highlighting how data can be extracted using simple hardware and open-source software the transparency and lack of authentication is showcased. READ MORE
-
25. Robust naval localization using a particle filter on polar amplitude gridmaps
University essay from KTH/Optimeringslära och systemteoriAbstract : Maritime navigation heaviliy relies on GNSS and related technologies for positioning and navigiation. Since these technologies are vulnerable to external threats such as signal spoofing, alternatives are needed for backup purposes. READ MORE