Sökning: "password attack"

Visar resultat 1 - 5 av 24 uppsatser innehållade orden password attack.

  1. 1. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Nyckelord :Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Sammanfattning : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. LÄS MER

  2. 2. Security analysis of a modern smart camera

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Simon Johannesson; Victor Pettersson; [2022]
    Nyckelord :Internet of Things; Security; Pentesting; PatrIoT; Wi-Fi Camera; Sakernas internet; Säkerhet; Penetrationstest; PatrIot; Wi-Fi-Kamera;

    Sammanfattning : IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. LÄS MER

  3. 3. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Xiaoyue Chen; [2022]
    Nyckelord :;

    Sammanfattning : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. LÄS MER

  4. 4. Denial-of-service attacks against the Parrot ANAFI drone

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jesse Feng; Joakim Tornert; [2021]
    Nyckelord :Penetration testing; cyber security; drone; denial-of-service attacks; Wi-Fi IEEE 802.11.;

    Sammanfattning : As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. LÄS MER

  5. 5. Effectiveness of Online Anti-Phishing Delivery methods in raising Awareness among Internet Users.

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Kamran Javed Hamdani; Muhammad Ijaz E Mustafa; [2021]
    Nyckelord :;

    Sammanfattning : ABSTRACT  Cyberattacks are constantly evolving and phishing activities have risen steeply in the last few years. As the number of online users is increasing so as the phishing attacks and scams are increasing too. LÄS MER