Sökning: "brute-force attack"

Visar resultat 1 - 5 av 20 uppsatser innehållade orden brute-force attack.

  1. 1. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gabriel Klasson Landin; Truls Julborg; [2023]
    Nyckelord :Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Sammanfattning : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. LÄS MER

  2. 2. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ramtin Erfani Torbaghani; [2023]
    Nyckelord :Cyber Security; Cyber Threat; Perception; Cyber Attack; Ransomware; Malware; Phishing; Packet Sniffing; Denial of Service; Insecure Passwords; IoT; Vulnerability Scanning; Brute Force Attacks; Awareness; Behaviour; Familiarity; University Students;

    Sammanfattning : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. LÄS MER

  3. 3. A case study of unauthorized login attempts against honeypots via remote desktop

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Oscar Rehnbäck; [2023]
    Nyckelord :;

    Sammanfattning :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER

  4. 4. Upptäckandet av säkerhetshot i privata nätverk : Hur du skyddar ditt hemnätverk

    Kandidat-uppsats, Mälardalens högskola/Akademin för innovation, design och teknik

    Författare :Saaid Alkamha; Alireza Ahmadi; [2023]
    Nyckelord :WPA2; accesspunkt; sårbarheter; trådlös säkerhet; trådlösa nätverk; brute force; deauth-DoS attack; SYN flood DoS attack;

    Sammanfattning : På grund av Covid 19 har de flesta människor valt att jobba hemifrån och de flesta hushåll har en accesspunkt som möjliggör kommunikation mellan flera enheter. Attacker mot Wi-Fi accesspunkter har ökat under de senaste åren på grund av sårbarheter som kan finnas i accesspunkten. LÄS MER

  5. 5. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Oscar Meyer; [2022]
    Nyckelord :Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Sammanfattning : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. LÄS MER