Sökning: "passive attacks"

Visar resultat 1 - 5 av 20 uppsatser innehållade orden passive attacks.

  1. 1. Penetration testing of a smart speaker

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Amin Nouiser; [2023]
    Nyckelord :Penetration testing; Ethical hacking; Smart speaker; Cybersecurity; Internet of Things; Penetrationstestning; Etisk hackning; Smart högtalare; Cybersäkerhet; Sakernas Internet;

    Sammanfattning : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. LÄS MER

  2. 2. Kartläggning av cybersäkerheten på uppkopplade bilar : Sårbarheter

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Pontus Claesson; [2023]
    Nyckelord :;

    Sammanfattning : The future is here with interconnected computers on four wheels - connected cars! Just like regular computers in networks, there is also a huge amount of cybersecurity challenges regarding vehicles. With the large amount of data transmitted between vehicles and other devices, a proper way of securing the connections is important. LÄS MER

  3. 3. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Nyckelord :Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Sammanfattning : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. LÄS MER

  4. 4. Good Girl, Wife or Foreign Fighter - Danish Media Constructions of women in ISIS

    Master-uppsats, Lunds universitet/Sociologiska institutionen; Lunds universitet/Sociologi

    Författare :Camilla Gissel; [2022]
    Nyckelord :ISIS; Female foreign fighters; Social Problems Theory; Narrative Criminology; ISIS bride; Betrayal; Social Sciences;

    Sammanfattning : Women who have joined the Islamic State of Iraq and Syria, ISIS, have been understood as serving passive and largely supportive roles in ISIS state-building by media and, to a far extent, academia. Academia has argued that the passive role evolves into active participation in weaponed combat and planning of attacks. LÄS MER

  5. 5. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    Master-uppsats, Linköpings universitet/Programvara och system

    Författare :Ludvig Thor; [2022]
    Nyckelord :OIDC; Single sign-on; Security;

    Sammanfattning : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. LÄS MER