Essays about: "threat modeling"

Showing result 1 - 5 of 92 essays containing the words threat modeling.

  1. 1. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint

    University essay from KTH/Hälsoinformatik och logistik

    Author : Marius Seffer; [2023]
    Keywords : ethical hacking; Internet of Things; security; smart home; threat modeling; economy; etisk hackning; Internet of Things; säkerhet; smarta hem; hotmodellering; ekonomi;

    Abstract : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. READ MORE

  2. 2. Development and characterization of multi-streams heat exchangers for liquefaction cycle analysis in the contextof hydrogen mobility

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : WULLSCHLEGER LÉA; [2023]
    Keywords : Liquefaction cycle; multi-streams heat exchanger; Matlab; PROOSIS; AMESIM; ArianeGroup;

    Abstract : This paper presents the master thesis work done at ArianeGroup on the development and characterization of multi-streams heat exchangers for liquefaction cycle analysis in the context of hydrogen mobility. In 2015, the Paris Agreements aimed at strengthening the global response to the threat of climate change by keeping the temperature rise below 1. READ MORE

  3. 3. Evaluating Security Mechanisms of Substation Automation Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyang Zhou; [2023]
    Keywords : Substation automation system; Threat modeling; Meta attack language; Stationsautomationssystem; Hotmodellering; Meta attack language;

    Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE

  4. 4. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  5. 5. Ethical Hacking of a Ring Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Arnar Pétursson; [2023]
    Keywords : Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE