Essays about: "2FA"
Found 4 essays containing the word 2FA.
-
1. What are the motivations and barriers for incorporating multi-factor authentication among IT students?
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The need for greater account security has grown as the globe has become more digitally connected. One of the solutions available today is multi-factor authentication, which enables users to add additional authentication factors to secure their accounts. READ MORE
-
2. Masquerader Detection via 2fa Honeytokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE
-
3. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. READ MORE
-
4. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. READ MORE