Spelling suggestions: "subject:"cracking"" "subject:"bracking""
71 |
Honeypots in network securityAkkaya, Deniz, Thalgott, Fabien January 2010 (has links)
Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
|
72 |
Applications de la théorie des jeux à champ moyen / Applications of mean field game theoryDogguy, Habib 05 December 2014 (has links)
Dans cette thèse nous nous intéressons à l'application de la théorie des jeux à champ moyen en économie. Cette nouvelle branche de la théorie des jeux permet d'étudier les systémes impliquant un grand nombre d'agents en utilisant la notionde champ moyen empruntée à la physique statistique. Cette méthode réduit considérablement la compléxité des interactions. Le premier modèle est consacré à l'étude des logiciles et montre que la tolérance du piratage peut être un moyen ef- _cace contre la propagation des logiciels libres. Le deuxième modèle est un modèle de champ moyen statique et traite du problème de stationnement dans les villes en introduisant de l'hétérogénéité dans la population des consommateurs. Cela nous permet de mieux évaluer les politiques publiques mises en oeuvre. Le troisième modèle analyse, dans un cadre dynamique, les conséquences du choix des jeunes chercheurs sur la dynamique des sciences. / In this thesis we study the application of Mean Field Game Theory in economics. This new branch of game theory is devoted to the study of systems involving a large number of interacting agents using the notion of mean field from Statistical Physics. This method reduces greatly the complexity of interactions. The first model is devoted to the study of Software market and shows that tolerance of piracy can be an effective strategy in order to limit the diffusion of free softwares. The second model is a static mean field game and addresses the problem of parking in cities by intro ducing heterogeneity among agents. This allows us to evaluate public policies. The third model analysis, in a dynamic setting, theconsequences of the choice of young researchers on the dynamics of science.
|
73 |
Technoethics and Organizing: Exploring Ethical Hacking within a Canadian UniversityAbu-Shaqra, Baha January 2015 (has links)
Ethical hacking is one important information security risk management strategy business and academic organizations use to protect their information assets from the growing threat of hackers. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This thesis addressed a gap within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the thesis paired technoethical inquiry theory with Karl Weick’s sensemaking model to explore ethical hacking in a Canadian university. In-depth interviews with key stakeholder groups and a document review were conducted. Guided by the Technoethical Inquiry Decision-making Grid (TEI-DMG), a qualitative framework for use in technological assessment, findings pointed to the need to expand the communicative and social considerations involved in decision making about ethical hacking practices. Guided by Weick’s theory, findings pointed to security awareness training for increasing sensemaking opportunities and reducing equivocality in the information environment.
|
74 |
P.S. I love you...and other growth hacking strategies used by disruptive tech start-ups : A case study on the relevance and enactment of growth hacking by Sweden's tech start-upsBergendal, Taghrid Sara January 2017 (has links)
Disruption innovation theory has been the zeitgeist for building globally disruptive tech companies since 1997. One decade later, disruptive tech start-ups are moving away from traditional marketing strategies in favour of growth hacking. There is a seemingly growing consensus by online tech experts, tech entrepreneurs, advisors and investors, that suggests that growth hacking is becoming increasingly important practice for disruption based tech start-ups. Furthermore, Sweden is becoming the Silicon Valley of the Nordics, producing more unicorns per capita than any other country in the world. This case study research is an investigation of the relevance and enactment of growth hacking by disruptive tech start-ups in Sweden. The main objective is to determine whether growth hacking is actually being used and how it is enacted by the start-ups. The goal is to explore how relevant this new term is, if it as popular as suggested in online literature and if so which growth hacks are being used. The study is conducted by carrying out a qualitative case study on five tech start-ups in Sweden: Fidesmo, a smart-chip payment system based on NFC technology that can be implanted into everyday objects such as watches, bracelets and cards, and that allows users to update and add new digital services as well as open doors or pay with a simple tap; TaskRunner, a geo-location based ‘help on demand’ platform that allows people to post ads for help with tasks while nearby task runners can bid to be hired to complete those tasks; Beleco, a unique marketplace for furniture rentals with a modern white-glove approach, that allows people to change or rent, rent-to-own or buy their furniture with the utmost ease; &frankly, a continuous tracking application software that helps create happier and productive workspaces by triggering and measuring engagement and surveys between employees and employers in a non-hierarchical manner; and Wunderino; a Malta-based online casino platform started by Swedish entrepreneurs with the goal of taking the traditional pressures associated with gambling away and replacing it with an element of fun and gaming. Empirical data collection consisted of the interviews and observational study of their innovation on their platform or website. The results were interpreted and contextualized within the disruption innovation theory framework. The results of the study reveal that growth hacking is relevant to disruptive tech start-ups, and is becoming increasingly important to them as their companies develop. Additionally the study reveals that growth hacking occurs organically within these start-up structures, already integrated into their marketing and strategy, without a separate or official definition of the practices. Additionally, growth hacking may have initially been seen as lower cost approach to marketing, however the research reveals that it is not lower cost if there isn’t someone who is highly technical on the founding team. Finally, the results reveal that growth hacking is not fully operationalized or defined as growth hacking to the extent of its popularity online and in popular texts, however it does lay on the horizon as a goal for tech start-ups.
|
75 |
Unstable Systems or Why Is My Junk So Raw?Musgrave, David 13 July 2016 (has links)
Unstable Systems or Why Is My Junk So Raw? is an exploration in the raw aesthetics of exposed electronics; showing the complicated systems that make our everyday electronics work using the visual language of formalism to display these “broken” consumer electronics as art. The work in my thesis show explores the creative potential of death and impermanence through the failing of technology. The work in the exhibition combines my interest and childhood fascination in electronics as well as my experience with my father’s illness. Accidentally and intentionally broken TV’s and electronics are producing live glitches which emphasize the instability of these otherwise closed systems.
|
76 |
Zabezpečení online aplikací typu klient-server / Security of Online Client-Server ApplicationsČapek, Jan January 2018 (has links)
This thesis is dedicated to security of client-server applications running on Windows platform. In the beginning chapters it is possible to find motivation, about why this type of security is important. Following content describes some elements of used architecture and elements of operating system Windows. The core of the work contains techniques and tools used by the attacker and protection against them. In following chapter there is a design and implementation of the security solution based on the previous theory. This solution is then tested against various threats, to verify its effectivity.
|
77 |
Bezpečnostní cvičení pro etický hacking / Security exercises for ethical hackingPaučo, Daniel January 2020 (has links)
This master thesis deals with penetration testing and ethical hacking. Regarding to the layout of the thesis there was prepared appropiate enviroment to realize Red/Blue team exercise, where Red team is in a role of the attacker and Blue team is in a role of defender of the network infrastructure. Whole infrastructure is implemented in a cloud virtual enviroment of VMware vSphere. Second part of the thesis consists of preparation and creation of the exercise to test web application security. Third part of the thesis is dedicating to the automatization of redteaming. Main focus of this master thesis is to demonstrate different attack vectors how to attack the network infrastructure and web applications and use of the defense mechanisms to avoid this kinds of attacks.
|
78 |
Living With Things : An open-source approach to the exploration of IoT through speculative design and hackingAlushi, Nefeli January 2021 (has links)
In the field of human-computer interaction, the majority of domestic IoT and smart devices run on proprietary software that possess limited technical properties and predetermined functionalities. As practices of building, modifying, and making IoT applications grow, this thesis follows an open-source approach to IoT to investigate the relationships of humans and things in a domestic setting. As a result of this material exploration, proprietary frameworks for interactions with smart devices are challenged through speculative scenarios, that include diverse instances of human-things interactions. Thus, a research through design methodology is suggested to support series of experiments, conducted to explore instances of perceived intelligence of these open-source hardware, without the use of advanced computational systems as proprietary devices entail. The suggested process is the creation of a speculative design artifact that combines hacking practices, to support designers in generating insights and to further iterate on possible open-source IoT interactions.
|
79 |
A Hacker-Centric Perspective to Empower Cyber DefenseJanuary 2020 (has links)
abstract: Malicious hackers utilize the World Wide Web to share knowledge. Previous work has demonstrated that information mined from online hacking communities can be used as precursors to cyber-attacks. In a threatening scenario, where security alert systems are facing high false positive rates, understanding the people behind cyber incidents can help reduce the risk of attacks. However, the rapidly evolving nature of those communities leads to limitations still largely unexplored, such as: who are the skilled and influential individuals forming those groups, how they self-organize along the lines of technical expertise, how ideas propagate within them, and which internal patterns can signal imminent cyber offensives? In this dissertation, I have studied four key parts of this complex problem set. Initially, I leverage content, social network, and seniority analysis to mine key-hackers on darkweb forums, identifying skilled and influential individuals who are likely to succeed in their cybercriminal goals. Next, as hackers often use Web platforms to advertise and recruit collaborators, I analyze how social influence contributes to user engagement online. On social media, two time constraints are proposed to extend standard influence measures, which increases their correlation with adoption probability and consequently improves hashtag adoption prediction. On darkweb forums, the prediction of where and when hackers will post a message in the near future is accomplished by analyzing their recurrent interactions with other hackers. After that, I demonstrate how vendors of malware and malicious exploits organically form hidden organizations on darkweb marketplaces, obtaining significant consistency across the vendors’ communities extracted using the similarity of their products in different networks. Finally, I predict imminent cyber-attacks correlating malicious hacking activity on darkweb forums with real-world cyber incidents, evidencing how social indicators are crucial for the performance of the proposed model. This research is a hybrid of social network analysis (SNA), machine learning (ML), evolutionary computation (EC), and temporal logic (TL), presenting expressive contributions to empower cyber defense. / Dissertation/Thesis / Doctoral Dissertation Computer Science 2020
|
80 |
Was leisten Port-Scanner?Müller, Thomas 26 April 2000 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und
Professur Rechnernetze und verteilte Systeme (Fakultaet fuer
Informatik) der TU Chemnitz.
Workshop-Thema: Infrastruktur der ¨Digitalen Universitaet¨
Port-Scanner sind Software-Werkzeuge, die benutzt werden,
um Informationen über Rechnersysteme im Internet zu ermitteln.
Häufig werden solche Werkzeuge von Angreifern benutzt, um verwundbare Rechnersysteme zu finden.
Der Vortrag stellt die Leistungsfähigkeit und die verwendeten Techniken von frei verfügbaren Port-Scannern dar.
Weiterhin werden Werkzeuge vorgestellt, mit denen Port-Scan-Vorgänge erkannt werden können.
|
Page generated in 0.0555 seconds