Sökning: "hacking"

Visar resultat 6 - 10 av 181 uppsatser innehållade ordet hacking.

  1. 6. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yaqi Tian; [2023]
    Nyckelord :Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Sammanfattning : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. LÄS MER

  2. 7. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  3. 8. Ethical Hacking of a Ring Doorbell

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Arnar Pétursson; [2023]
    Nyckelord :Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Sammanfattning : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. LÄS MER

  4. 9. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Adam Lindberg; [2023]
    Nyckelord :IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Sammanfattning : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. LÄS MER

  5. 10. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yang Wang; [2023]
    Nyckelord :Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Sammanfattning : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. LÄS MER