Sökning: "Penetration Testing"

Visar resultat 11 - 15 av 161 uppsatser innehållade orden Penetration Testing.

  1. 11. Modeling and Simulation for Forward Arming and Refueling Points : Enhancing efficiency and Decision- making in Military Operations

    Master-uppsats, Försvarshögskolan

    Författare :Philip Muurmans; [2023]
    Nyckelord :FARP; military operation; military logistics; military capability; Modeling and Simulation; Monte Carlo simulation; discrete event simulation; IS framework;

    Sammanfattning : This master’s thesis explores the application of Modeling and Simulation (M&S) techniques in military operations involving Forward Arming and Refueling Points (FARP). FARPs play a crucial role in supporting aircraft operations by facilitating deep penetration into enemy territory and ensuring sustained presence in the Area of Operation (AOO). LÄS MER

  2. 12. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Adam Lindberg; [2023]
    Nyckelord :IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Sammanfattning : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. LÄS MER

  3. 13. Guidelines for white box penetration testing wired devices in secure network environments

    Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Daniel Le Vandolph; [2023]
    Nyckelord :Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Sammanfattning : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. LÄS MER

  4. 14. Säkerheten i webbapplikationer mot SQL- injektionsattacker : En studie av tekniker, säkerhetspåverkan och förekommande skyddslösningar

    M1-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Ranim Hanna Malko; [2023]
    Nyckelord :SQL injection attack; security vulnerabilities; data integrity; web applications; prevention techniques; SQL-injektionsattack; säkerhetssårbarheter; dataintegritet; webbapplikationer; förebyggande tekniker;

    Sammanfattning : Web applications constitute an essential part of our daily lives, providing us access to significant online services and information. Despite their advantages, they are also vulnerable to security threats, particularly SQL injection attacks. LÄS MER

  5. 15. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Johan Henning; [2023]
    Nyckelord :Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Sammanfattning : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. LÄS MER