IT/IOT CYBER EXPLORATION
Karn, Sameer (2024)
Karn, Sameer
2024
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2024053119435
https://urn.fi/URN:NBN:fi:amk-2024053119435
Tiivistelmä
The need to implement strict security measures in today’s world of InformationTechnology and the Internet of Things has become very important. The thesis focused on exploring different domains of cyber threats by breaking them down into several experiments to show case the potential harm and chaos they could bring in normal day-to-day life.
The thesis provides an easy peek into different kinds of cyber-attacks and methods that bad people would use to compromise important systems. It discusses some of the common and important threats for the Internet Things (IoT) systems. It showcased different labs with different sets of goals, such as bypassing antivirus systems, encrypting important file systems, and implanting back doors and Trojans.
In conclusion, the thesis provided a clear demonstration of different cyber-attacks and their methodologies, with their consequences with demonstrations of real-world scenarios that could be beneficial for people in their day-to-day lives to big industrial corporations. It served as a valuable resource for people from both the technical side and non-technical perspective, which also discussed preventive measures that could be implemented easily.
The thesis provides an easy peek into different kinds of cyber-attacks and methods that bad people would use to compromise important systems. It discusses some of the common and important threats for the Internet Things (IoT) systems. It showcased different labs with different sets of goals, such as bypassing antivirus systems, encrypting important file systems, and implanting back doors and Trojans.
In conclusion, the thesis provided a clear demonstration of different cyber-attacks and their methodologies, with their consequences with demonstrations of real-world scenarios that could be beneficial for people in their day-to-day lives to big industrial corporations. It served as a valuable resource for people from both the technical side and non-technical perspective, which also discussed preventive measures that could be implemented easily.