Essays about: "thesis on hacking of computer"

Showing result 1 - 5 of 10 essays containing the words thesis on hacking of computer.

  1. 1. Assessing the threat posed by USB devices

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Christopher Ekström; [2022]
    Keywords : ;

    Abstract : The introduction of the USB standard in 1996 made life easier for users, by removing the need for different hardware connectors and custom drivers, as well for manufacturers of computer peripherals, who no longer had to develop new drivers for each new peripheral. But, as is often the case with new technology, it did not take long for people to start using this ill purposes. READ MORE

  2. 2. Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Albin Winkelmann; [2022]
    Keywords : IoT; threat modeling; computer security; smart lock; pentesting; IoT; hotmodellering; datasäkerhet; smarta lås; penetrationstestning;

    Abstract : IoT devices have become more common in our everyday lives as they provide more useful features than traditional devices. One such device is the smart door lock, which enables homeowners to grant access on a user-specified level through digital keys and remote operation. READ MORE

  3. 3. Hacking Into Someone’s Home using Radio Waves : Ethical Hacking of Securitas’ Alarm System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Axel Lindeberg; [2021]
    Keywords : penetration testing; threat modeling; IoT; computer security; home alarm system; penetrationstestning; hotmodellering; IoT; datasäkerhet; hemlarmsystem;

    Abstract : The number of IoT systems in our homes has exploded in recent years. By 2025 it is expected that the number of IoT devices will reach 38 billion. Home alarm systems are an IoT product that has increased dramatically in number and complexity in recent years. READ MORE

  4. 4. Living With Things : An open-source approach to the exploration of IoT through speculative design and hacking

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Nefeli Alushi; [2021]
    Keywords : Domestic Internet of Things; Research through design; Open-source hardware; Arduino; Speculative design; Hacking practices;

    Abstract : In the field of human-computer interaction, the majority of domestic IoT and smart devices run on proprietary software that possess limited technical properties and predetermined functionalities. As practices of building, modifying, and making IoT applications grow, this thesis follows an open-source approach to IoT to investigate the relationships of humans and things in a domestic setting. READ MORE

  5. 5. Visualization and Natural Language Representation of Simulated Cyber Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinyue Mao; [2018]
    Keywords : attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation;

    Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE