Sökning: "Brute force attack"
Visar resultat 1 - 5 av 20 uppsatser innehållade orden Brute force attack.
1. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. LÄS MER
2. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. LÄS MER
3. A case study of unauthorized login attempts against honeypots via remote desktop
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER
4. Upptäckandet av säkerhetshot i privata nätverk : Hur du skyddar ditt hemnätverk
Kandidat-uppsats, Mälardalens högskola/Akademin för innovation, design och teknikSammanfattning : På grund av Covid 19 har de flesta människor valt att jobba hemifrån och de flesta hushåll har en accesspunkt som möjliggör kommunikation mellan flera enheter. Attacker mot Wi-Fi accesspunkter har ökat under de senaste åren på grund av sårbarheter som kan finnas i accesspunkten. LÄS MER
5. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. LÄS MER