Sökning: "passive attacks"
Visar resultat 1 - 5 av 20 uppsatser innehållade orden passive attacks.
1. Penetration testing of a smart speaker
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. LÄS MER
2. Kartläggning av cybersäkerheten på uppkopplade bilar : Sårbarheter
Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : The future is here with interconnected computers on four wheels - connected cars! Just like regular computers in networks, there is also a huge amount of cybersecurity challenges regarding vehicles. With the large amount of data transmitted between vehicles and other devices, a proper way of securing the connections is important. LÄS MER
3. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. LÄS MER
4. Good Girl, Wife or Foreign Fighter - Danish Media Constructions of women in ISIS
Master-uppsats, Lunds universitet/Sociologiska institutionen; Lunds universitet/SociologiSammanfattning : Women who have joined the Islamic State of Iraq and Syria, ISIS, have been understood as serving passive and largely supportive roles in ISIS state-building by media and, to a far extent, academia. Academia has argued that the passive role evolves into active participation in weaponed combat and planning of attacks. LÄS MER
5. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective
Master-uppsats, Linköpings universitet/Programvara och systemSammanfattning : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. LÄS MER