• English
    • svenska
  • svenska 
    • English
    • svenska
  • Logga in
Redigera dokument 
  •   Startsida
  • Student essays / Studentuppsatser
  • Department of Computer Science and Engineering / Institutionen för data- och informationsteknik
  • Kandidatuppsatser
  • Redigera dokument
  •   Startsida
  • Student essays / Studentuppsatser
  • Department of Computer Science and Engineering / Institutionen för data- och informationsteknik
  • Kandidatuppsatser
  • Redigera dokument
JavaScript is disabled for your browser. Some features of this site may not work without it.

Threat modelling and vulnerability assessment for IoT solutions: a case study

Threat modelling and vulnerability assessment for IoT solutions: a case study

Sammanfattning
The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. The goal of this study is to inspect how threat modelling and vulnerability assessment is applied in applied in industry. The study is conducted as a single case study with an IoT company, in order to explore the aforementioned security aspects from the practitoner's perspective, by conducting interviews and by looking into the documentation of an IoT solution, as well as existing literature. Results indicate that although threat modelling constitutes a well researched area, tehre is evidence that it is not well integrated into the overall software development process. However, practitioners do perform threat identification analysis in their work without applying a particular methodology. In addition, a lack of a systemativ and structured process when performing vulnerability assessment activities was evident. Practitioners appear to evalute their design and architecture, but there is a need for a strategy for integration of security testing and penetration testing into the software development life cycle (SDLC). Our findings are summarised into recommendations to practitioners with a list of open source penetration testing tools, guidelines, and suggestions for conducting threat modelling and vulnerability assessment. Futhermore, our scientific contributions provide insights on the work process that is in place in the industry, in regards to threat modelling and vulnerability assesment.
Examinationsnivå
Student essay
URL:
https://hdl.handle.net/2077/72699
Samlingar
  • Kandidatuppsatser
Fil(er)
Bachelor of Science Thesis in Software Engineering and Management (1.201Mb)
Datum
2022-07-06
Författare
Parvanov, Krasen Anatoliev
Tsagkidis, Chrysostomos
Nyckelord
Terms Threat Modelling
Internet of Things
IoT
Vulnerabilities
Vulnerability assessment
Penetration testing tools
Språk
eng
Metadata
Visa fullständig post

DSpace software copyright © 2002-2016  DuraSpace
gup@ub.gu.se | Teknisk hjälp
Theme by 
Atmire NV
 

 

Visa

VisaSamlingarI datumordningFörfattareTitlarNyckelordDenna samlingI datumordningFörfattareTitlarNyckelord

Mitt konto

Logga inRegistrera dig

DSpace software copyright © 2002-2016  DuraSpace
gup@ub.gu.se | Teknisk hjälp
Theme by 
Atmire NV