Sökning: "Penetrationstest"
Visar resultat 16 - 20 av 45 uppsatser innehållade ordet Penetrationstest.
16. Ethical Hacking of Android Auto in the Context of Road Safety
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With a more than ever increasing demand to interconnect smartphones with infotainment systems, Android Auto has risen in popularity with its services used in modern vehicles worldwide. However, as users progressively connect their smartphones to in-vehicle infotainment systems, the opportunity for malicious actors to endanger and access private data of Android Auto users advances as well. LÄS MER
17. Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : 5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. LÄS MER
18. Etisk hackning : Säkerheten i en nätbutik
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : E- handelsmarknaden har de senaste åren växt explosionsartat. I och med den ökade användningen av nätbutiker där bland annat personuppgifter och betalningar behandlas är det viktigt att se till att säkerheten håller måttet. I denna rapport undersöks säkerheten i en populär nätbutik genom utförandet av penetrationstester. LÄS MER
19. Ethical hacking of Garmin’s sports watch
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : IoT devices within the technical market are rapidly growing in popularity. However, they are still young and due to the rapid growth and demand of the market, they are also known to be more vulnerable to attacks compared to other applications. LÄS MER
20. Blockchain Applicability in IoT Systems
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. The Internet of things (IoT) combines sensors and connectivity and can be applied to a wide variety of things. The security in these IoT devices is usually constrained by their limited hardware. When IoT handles sensitive data, security becomes an important challenge. LÄS MER