Sökning: "Spoofing Attacks"

Visar resultat 1 - 5 av 10 uppsatser innehållade orden Spoofing Attacks.

  1. 1. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Daria Galal; Martin Tillberg; [2020]
    Nyckelord :izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Sammanfattning : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. LÄS MER

  2. 2. Penetration testing a civilian drone : Reverse engineering software in search for security vulnerabilities

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Viktor Edström; Eldar Zeynalli; [2020]
    Nyckelord :;

    Sammanfattning : Civilian drones have become more popular in recent years. As an IoT (Internet of Things) device full of state of the art technologies, its level of security is highly relevant. That is why we chose to take a look at the previous research done in the field to see how the attack surface of civilian drones looks. LÄS MER

  3. 3. Spoofing Mitigation Using Multiple GNSS-Receivers

    Master-uppsats, Linköpings universitet/Reglerteknik

    Författare :Niklas Stenberg; [2019]
    Nyckelord :GNSS; spoofing; mitigation;

    Sammanfattning : Global Navigation Satellite Systems (GNSS) are used in a multitude of civilian as well as security related applications. GNSS-receivers are vulnerable to different types of spoofing attacks where the receiver is ``tricked'' to provide false position and time estimates. LÄS MER

  4. 4. A Game of Drones : Cyber Security in UAVs

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Elsa Dahlman; Karin Lagrelius; [2019]
    Nyckelord :UAS Unmanned Aircraft System ; UAV Unmanned Aerial Vehicle ; Drone; Drönare; OLF Obemannad luftburen farkost ;

    Sammanfattning : As Unmanned Aerial Vehicles (UAVs) are getting more popular and their area of use is expanding rapidly, the security aspect becomes important to investigate. This thesis is a systematic literature review that examines which type of cyber attacks are most common among attacks directed at civilian use UAVs and what consequences they bring. LÄS MER

  5. 5. Two way Firewall for Internet of Things

    Master-uppsats, KTH/Skolan för elektro- och systemteknik (EES)

    Författare :Challa Renuka Venkata Ramani; [2016]
    Nyckelord :;

    Sammanfattning : The Internet of Things(IoT), an emerging global Internet-based technical architecture impacts the security and privacy of the stakeholders involved. IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things. LÄS MER