Sökning: "attacking tools"

Visar resultat 1 - 5 av 11 uppsatser innehållade orden attacking tools.

  1. 1. Asserting password crackers ability to target Swedish passwords : An analysis

    Master-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Casper Jensen; [2023]
    Nyckelord :cyber security; passwords; it-security; swedish passwords;

    Sammanfattning : In today's digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. Unfortunately, this makes password information a prime target for hackers, who can gain access to our entire digital existence. LÄS MER

  2. 2. The Classification of Civilians as Human Shields: a Means to Justify Violence?

    Master-uppsats, Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Författare :Coline Marie Proy; [2023]
    Nyckelord :Law and Political Science;

    Sammanfattning : Human shields have been increasingly documented in contemporary theatres of war. In this context, it is interesting to examine the circumstances in which the attacking party classifies the civilians they face as human shields. LÄS MER

  3. 3. Impersonating a sandbox against evasive malware

    Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Axel Lindorin; [2022]
    Nyckelord :evasive; malware; malware analysis; comparison; sandbox;

    Sammanfattning : The steadily increasing amount of malware puts an even larger amount of work required to analyze all the gathered samples. The current methods of analyzing malware come with their downsides such as inefficiency as a manual analysis requires a human or dynamic analysis that could be considered unreliable. LÄS MER

  4. 4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Adina Borg; Hedda Klintskog; [2022]
    Nyckelord :Technology and Engineering;

    Sammanfattning : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. LÄS MER

  5. 5. Understanding the Northern pike (Esox lucius) through accelerometer, is it possible?

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för biologi och miljö (BOM)

    Författare :Oskar Andersson; [2020]
    Nyckelord :;

    Sammanfattning : Accelerometer biologgers är ett verktyg för att identifiera beteenden hos djur. För att kunna använda accelerometern effektivt är det viktigt att träna en maskin–inlärning algoritm för att kunna identifiera olika beteenden utifrån accelerations data. LÄS MER