Avancerad sökning

Visar resultat 1 - 5 av 24 uppsatser som matchar ovanstående sökkriterier.

  1. 1. How is it possible to calculate IT security effectiveness?

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Kristjan Kivimaa; [2022]
    Nyckelord :Security effectiveness; IT security;

    Sammanfattning : In IT Security world, there is lack of available, reliable systems for measuring securitylevels/posture. They lack the range of quantitative measurements and easy and fast deployment,and potentially affects companies of all sizes. LÄS MER

  2. 2. Security analysis of a modern smart camera

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Simon Johannesson; Victor Pettersson; [2022]
    Nyckelord :Internet of Things; Security; Pentesting; PatrIoT; Wi-Fi Camera; Sakernas internet; Säkerhet; Penetrationstest; PatrIot; Wi-Fi-Kamera;

    Sammanfattning : IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. LÄS MER

  3. 3. Ethical hacking of a Smart Wi-Fi Plug

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Markus Newton Hedelin; Marcus Samuelsson; [2022]
    Nyckelord :Bachelor’s thesis; Ethical hacking; Penetration testing; Internet of things; Smart plug; Mobile application; Cloud service; Kandidatexamensarbete; Etisk hackning; Penetrationstestning; Sakernas internet; Smart uttag; Mobilapplikation; Molntjänst;

    Sammanfattning : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. LÄS MER

  4. 4. Security Analysis of Microservice Choices

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Daniel Dannberg; [2021]
    Nyckelord :Threat modeling; Security; Microservices; The Common Misuse Scoring System; National Institute of Standards and Technology; Return Of Security Investment; Hotmodellering; Säkerhet; Mikrotjänster; Säkerhetsinvestering; Evaluering av säkerhet;

    Sammanfattning : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. LÄS MER

  5. 5. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Alex Gustafsson; Carl Stensson; [2021]
    Nyckelord :Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Sammanfattning : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. LÄS MER