Sökning: "Security Misconfiguration"

Hittade 5 uppsatser innehållade orden Security Misconfiguration.

  1. 1. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  2. 2. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Nyckelord :Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Sammanfattning : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. LÄS MER

  3. 3. Automating the basic configuration of IPMI interfaces : To reduce the risk of misconfiguration

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Mark Jack Sundahl; [2020]
    Nyckelord :;

    Sammanfattning : In this report the lack of basic security of IPMI devices when freshly received from the manufacturer will be discussed and analysed. Furthermore, the rest of the report will focus on attempting to find a solution on how to automate configuration of IPMI devices (and iDRACs due to hardware being borrowed from Ericsson Linköping) to avoid misconfigurations and to change the default credentials shipped. LÄS MER

  4. 4. Check Yourself Before You Wreck Yourself- A study of how to assess security vulnerabilities of web servers through configuration analysis

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Ingrid Hyltander; [2019]
    Nyckelord :Software Vulnerabilities; Security Misconfiguration; Configuration Analysis; Web Server; Apache; Nginx; Technology and Engineering;

    Sammanfattning : The web server is an essential component of many systems today. It has the possibility to give access to files with sensitive information and it is the backbone that enable a vast amount of applications. LÄS MER

  5. 5. Creating a Secure Server Architecture and Policy for Linux-based Systems

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Författare :Marios Kourtesis; [2015]
    Nyckelord :IDS; secure environments; Linux; network management systems; server security; web application firewall; server security;

    Sammanfattning : Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. LÄS MER