DFaaS / UC2WMD051

DFaaS / UC2WMD051

The IT industry today have moved a lot of their resources and services into the cloud. And as a result from this, cloud is not only being used for data storage and backup – but many typical services such as software (SaaS) or generally XaaS (X as a Service). In...
Mobile Forensics / UC2WMD051

Mobile Forensics / UC2WMD051

For this report I am testing three mobile forensics tools to evaluate them on various criteria. I am looking at ease of use, documentation/guidance, graphical interface, analysis quality and reporting. For this report I am using an iPhone 5 (Model: A1429) with 32 GB...
Windtalker / UC2WMD051

Windtalker / UC2WMD051

There are a vast amount of security features implemented into technology today, making life harder for people with malicious intent to gain access to valuable information. Whilst we use two-factor authentication, 256-bit cryptography and other means to secure digital...
Interaction / UC2WMD051

Interaction / UC2WMD051

In the Wireless and Mobile Devices -course we have had a great deal of interaction. Mostly I have been interacting with C.P. Bakke and A.F. Løvhøiden, and it has been mostly discussions and testing in regards to various wireless attacks. The original entry was made by...
Cracking WEP / UC2WMD051

Cracking WEP / UC2WMD051

Although most providers and users today are using WPA2 encryption, there are still a lot of users that set their wireless network with WEP security (Wired Equivalent Privacy). It is estimated that the amount of WEP-users correlate with the number of Swedish people in...