An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.
Mattieu Detaille & Mohammad Muntasib Ali Syed, both computer science engineers, are passionate about cyber security as well as artificial intelligence. They obtained a bachelor and master in engineering at Université catholique de Louvain, in Belgium. Mattieu is currently studying in San Francisco. Muntasib is currently working as an IT consultant.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Artikel-Nr. 151236388
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.Books on Demand GmbH, Überseering 33, 22297 Hamburg 196 pp. Englisch. Artikel-Nr. 9783330073074
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 196 pages. 8.66x5.91x0.45 inches. In Stock. Artikel-Nr. 3330073071
Anzahl: 1 verfügbar