Sökning: "Critical vulnerabilities"

Visar resultat 16 - 20 av 107 uppsatser innehållade orden Critical vulnerabilities.

  1. 16. Assessing the threat of Stingrays in 4G cellular networks

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Emil Karim; Sina Khoraman; [2023]
    Nyckelord :Cellular network; Wireless communication; Stingray; Privacy; Surveillance; Tracking; 4G; Software-defined radio; Cellulärt nätverk; Trådlös kommunikation; Stingray; Integritet; Övervakning; Spårning; 4G; Mjukvarudefinierad radio;

    Sammanfattning : This bachelor thesis explores the threat of Stingrays, fake cell towers, to the mobile network. The increasing availability of open-source technology and hardware has made it easier to build Stingrays. LÄS MER

  2. 17. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Alejandra Mugica Trapaga; [2023]
    Nyckelord :3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Sammanfattning : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. LÄS MER

  3. 18. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Sinan Sakaoglu; [2023]
    Nyckelord :Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Sammanfattning : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. LÄS MER

  4. 19. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Adrián Olmedilla Belinchón; [2023]
    Nyckelord :COVID-19; Cyber-attack; Internet security; Cybersecurity threats; Remote Work; Cybersecurity Awareness; COVID-19; cyber-attack; Internetsäkerhet; Cybersäkerhetshot; Fjärrarbete; Cybersäkerhetsmedvetenhet; COVID-19; Ataque cibernético; Seguridad en Internet; Amenazas a la seguridad cibernética; Trabajo remoto; Concienciación sobreseguridad cibernética;

    Sammanfattning : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. LÄS MER

  5. 20. Resiliens inom dricksvattenområdet ur ett beredskaps- och beroendeperspektiv

    Master-uppsats, Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet; Lunds universitet/Riskhantering (CI)

    Författare :Jakob Jungestad; [2023]
    Nyckelord :Critical infrastructure; Resilience; Robustness; Redundancy; Drinking water; Drinking water infrastructure; Vulnerability; Preparedness; Civil defense; Dependencies; Risk; Network theory; Water distribution system; Sweden; Kritisk infrastruktur; Civil beredskap; Dricksvatten; Technology and Engineering;

    Sammanfattning : The drinking water infrastructure is among our most critical infrastructures and hence it is important for society to secure. Today, there is a lot of critical infrastructures that are dependent on different conditions to uphold its functionality. These critical infrastructures are often interdependent as well. LÄS MER