Essays about: "Identity Access Management"

Showing result 1 - 5 of 40 essays containing the words Identity Access Management.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. The Devil Wears (New) Prada

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Hanna Björkman; Elsa Spenninge; [2023]
    Keywords : identity projects; self-presentation; luxury fashion rental; Consumer Culture Theory; access-based consumption; luxury fashion; Impression Management; Social Distinction; the extended self; Business and Economics;

    Abstract : In contemporary society, it is emphasised that ownership of clothing plays a crucial role in construction- and presentation of personal identities. With the rise of sustainable consumerism and the sharing economy, access-based consumption has emerged as a notable trend, offering individuals temporary access to non-exclusively owned clothing. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Transformative Gender Justice : Constructions of Justice, Violence, and Reparations for Survivors of Conflict-Related Sexual Violence in Northeastern Nigeria

    University essay from Lunds universitet/Institutionen för kulturgeografi och ekonomisk geografi; Lunds universitet/LUMID International Master programme in applied International Development and Management

    Author : Grayden Mills Tilley Prince; [2023]
    Keywords : Transformative Justice; Violence; Reparations; CRSV; Nigeria; GBV; Sexual Violence; Agency; Power; Gender; Social Sciences;

    Abstract : Alongside global acknowledgements of the gendered nature of conflict, the academic field of transitional justice is shifting towards the newly emerging concept of transformative justice. Within this, reparations are particularly seen as the most agent-centric tool for structural transformation. READ MORE

  5. 5. Make America Green Again: Understanding Trumpism as it Relates to Environmental Injustice Legislation

    University essay from Lunds universitet/Internationella miljöinstitutet

    Author : Brooke Moore; [2023]
    Keywords : Trumpism; Environmental Justice; Environmental Legislation; Framing Analysis; Earth and Environmental Sciences; Law and Political Science;

    Abstract : The United States is witnessing the emergence of what has popularly been coined Trumpism – a new conservatism inspired by the administration of Donald J. Trump, however, extending beyond to other far-right politicians. READ MORE