Sökning: "Attack surfaces"

Visar resultat 1 - 5 av 27 uppsatser innehållade orden Attack surfaces.

  1. 1. Evaluating Security Mechanisms of Substation Automation Systems

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ziyang Zhou; [2023]
    Nyckelord :Substation automation system; Threat modeling; Meta attack language; Stationsautomationssystem; Hotmodellering; Meta attack language;

    Sammanfattning : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. LÄS MER

  2. 2. Ethical Hacking of a Ring Doorbell

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Arnar Pétursson; [2023]
    Nyckelord :Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Sammanfattning : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. LÄS MER

  3. 3. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Kateryna Sydorenko; [2023]
    Nyckelord :Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Sammanfattning : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. LÄS MER

  4. 4. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Nyckelord :Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Sammanfattning : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. LÄS MER

  5. 5. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Nyckelord :Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Sammanfattning : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. LÄS MER