Essays about: "Access Control Lists"

Showing result 1 - 5 of 8 essays containing the words Access Control Lists.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Secure log-management for an Apache Kafka-based data-streaming service

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hjalmar Kull; Mirza Hujic; [2023]
    Keywords : Apache Kafka;

    Abstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE

  3. 3. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  4. 4. En katts belåtenhet : djurhållning och krav på katthem och kattpensionat

    University essay from SLU/Dept. of Animal Environment and Health

    Author : Henrik Olsson; [2018]
    Keywords : Katt; Katthem; Kattpensionat; Djurhållning; Stress; Adoption; Berikning;

    Abstract : The cat (Felis silvestris catus) introduced itself to our society roughly 11 500 – 12 500 years ago in the shape of the African wildcat ( Felis silvestris lybica ). It quickly found a place among us, functioning as pest control, and later on as a pet. Today cats stand as the most common pet in Sweden, residing in over 750 000 Swedish households. READ MORE

  5. 5. Efficient IPv6 Neighbor Discovery in Wireless Environment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Dragos Neagoe; Antonios Pateas; [2016]
    Keywords : IPv6; Neighbor Discovery; 6LoWPAN; RFC 4861; Technology and Engineering;

    Abstract : As the address space of IPv4 is being depleted with the development of IoT (Internet Of Things), there is an increasing need for permanent transition to the IPv6 protocol as soon as possible. Nowadays, many 3GPP (3rd Generation Partnership Project) Networks have implemented or will implement IPv6 in the near future for Internet access. READ MORE