Essays about: "deception techniques"

Showing result 1 - 5 of 9 essays containing the words deception techniques.

  1. 1. Scams and Counter-Scams: An Investigation Into the Deception Tactics of Phone Scammers and Scambaiters

    University essay from Lunds universitet/Sociologi; Lunds universitet/Sociologiska institutionen

    Author : Elina Werther; [2023]
    Keywords : scamming; scambaiting; scam calls; victimhood; performances; manipulation; ideal victim s ; Social Sciences;

    Abstract : The purpose of this thesis is to investigate the techniques that scammers and scambaiters use in phone conversations to deceive each other and accomplish their respective goals. Seeing how the number of people losing money to scams continues to rise every year, there is an urgent need for more research to raise awareness of common scam tactics. READ MORE

  2. 2. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE

  3. 3. Leveraging an Active Directory for the Generation of Honeywords

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johan Lundström; [2018]
    Keywords : honeywords; passwords; authentication; password-based authentication; password cracking; deception techniques;

    Abstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE

  4. 4. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE

  5. 5. (S)examensarbete

    University essay from Konstfack/Textil

    Author : Cecilia Pfaff; [2016]
    Keywords : art; textile art; knitting; crochet; sex; sexy; sexiness; Instagram; selfie; performance; sun chair; craftivism; Dolly Parton; body; feminism; #xxxjobb; #123sexy; konst; textilkonst; stickning; virkning; sex; sexig; sexighet; Instagram; selfie; performance; solstol; craftivism; Dolly Parton; kropp; feminism; #xxxjobb; #123sexy;

    Abstract : Preface: Thank you to all the women in my life who have supported me through this process; to my mother, to my other mother (Susan), to Kara, to Jordan and, of course, to Dolly. Summary: (S)examensarbete is a journey through which I have questioned if knitting can be sexy. READ MORE