Sökning: "hardware vulnerability"
Visar resultat 1 - 5 av 10 uppsatser innehållade orden hardware vulnerability.
1. Testing IoT Security : A comparison of existing penetration testing frameworks and proposing a generic framework
Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : The Internet of Things (IoT) refers to the billions of physical devices linked to the Internet worldwide, integrating into various systems like healthcare, finance, and transportation. However, the rapid market expansion has led to software and hardware security shortcomings, leaving IoT devices vulnerable to cybercriminals. LÄS MER
2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. LÄS MER
3. Forensic Analysis of the Nintendo Switch
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. LÄS MER
4. Är gymnasieskolans digitala säkerhet tillräcklig? : Risk- och sårbarhetsanalys, ur ett informationssäkert perspektiv
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : This work presents a study of how information security has been implemented in the municipal high school. The study covers applications' resistance to intrusion, hardware security, students & the IT department's overall competence, also requirements for confidentiality in relation to municipal and state guidelines. LÄS MER
5. How to design a trustworthy IPsec VPN device employing nested tunnels?
Magister-uppsats, Luleå tekniska universitet/DatavetenskapSammanfattning : Enterprises use site-to-site \textit{Virtual Private Network} (VPN) technology to securely transmit data over insecure networks, such as the Internet. By utilizing commercial VPN products, organizations partially rely on the vendors to keep their communication out of reach from malicious groups or individuals. LÄS MER