Sökning: "Hackers"
Visar resultat 16 - 20 av 94 uppsatser innehållade ordet Hackers.
16. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. LÄS MER
17. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. LÄS MER
18. Penetration testing to improve the security position of a scale-up software company
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Micro-mobility companies have in recent years introduced electric vehicles such as bikes, scooters and mopeds as a sustainable alternative to traditional combustion engine cars in inner cities. Having electric vehicles available in the cities comes with corporate responsibilities, such as making sure the electric vehicles follow national laws regarding speed and parking. LÄS MER
19. Modeling a Security Operations Center
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : Security breaches caused by hackers are a significant issue for businesses. This illustrates the need for protection against these attacks. Using a Security Operations Center (SOC) solution to detect attacks against ones corporation is an essential step in doing that. LÄS MER
20. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments
Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Signaler och systemSammanfattning : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. LÄS MER