Sökning: "Attack surfaces"
Visar resultat 1 - 5 av 27 uppsatser innehållade orden Attack surfaces.
1. Evaluating Security Mechanisms of Substation Automation Systems
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. LÄS MER
2. Ethical Hacking of a Ring Doorbell
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. LÄS MER
3. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER
4. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. LÄS MER
5. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. LÄS MER