Sökning: "hardware vulnerability"

Visar resultat 1 - 5 av 10 uppsatser innehållade orden hardware vulnerability.

  1. 1. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Alva Widerberg Palmfeldt; William Mattsson; [2023]
    Nyckelord :Internet of Things; penetration testing; standardization; framework; vulnerability exploitation;

    Sammanfattning : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. LÄS MER

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Sinan Sakaoglu; [2023]
    Nyckelord :Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Sammanfattning : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. LÄS MER

  3. 3. Forensic Analysis of the Nintendo Switch

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Jelle van den Berg; Filip Lagerholm; [2020]
    Nyckelord :Nintendo Switch; forensic analysis; hardware vulnerability; network capture;

    Sammanfattning : In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. LÄS MER

  4. 4. Är gymnasieskolans digitala säkerhet tillräcklig? : Risk- och sårbarhetsanalys, ur ett informationssäkert perspektiv

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Farhad Rahimi; Mevlyde Isufi; [2020]
    Nyckelord :Cybersecurity; Highschool; Phishing; Pentesting; Vulnerability; Cloud; Informationssäkerhet; Gymnasieskola; Sårbarhet; Molnet;

    Sammanfattning : This work presents a study of how information security has been implemented in the municipal high school. The study covers applications' resistance to intrusion, hardware security, students & the IT department's overall competence, also requirements for confidentiality in relation to municipal and state guidelines. LÄS MER

  5. 5. How to design a trustworthy IPsec VPN device employing nested tunnels?

    Magister-uppsats, Luleå tekniska universitet/Datavetenskap

    Författare :Alexander Spottka; [2018]
    Nyckelord :Nesting; IPSec; nested; tunnel; encryption;

    Sammanfattning : Enterprises use site-to-site \textit{Virtual Private Network} (VPN) technology to securely transmit data over insecure networks, such as the Internet. By utilizing commercial VPN products, organizations partially rely on the vendors to keep their communication out of reach from malicious groups or individuals. LÄS MER