Essays about: "Active Directory"

Showing result 1 - 5 of 13 essays containing the words Active Directory.

  1. 1. Liberté, Égalité, Bien Habillée : Feminine socio-cultural norms from a fashion magazine in the context of the French Directoire, 1797–99

    University essay from Uppsala universitet/Historiska institutionen

    Author : Chiara Arghittu; [2022]
    Keywords : Fashion history; French Revolution; Directoire; Directory; Journal des Dames et des Modes; Gender history; Political history; Histoire de la mode; Révolution française; Directoire; Journal des Dames et des Modes; Histoire du genre; Histoire politique;

    Abstract : The Journal des Dames et des Modes started its publication in 1797 and was de facto the only popular and lasting fashion magazine aimed towards women since the fall of its predecessor, even prior to 1789. This study argues that this fashion magazine both reflected and constituted the mindset of the new regime’s elite. READ MORE

  2. 2. Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Viktor Uppströmer; Henning Råberg; [2019]
    Keywords : Advanced Persistent Threat; Lateral Movement; Active Directory; Multiclass Classification; Intrusion Detection System; Avancerade långvariga hot; Lateral rörelse; Active Directory; Multiklassklassificering; Intrångsdetektering;

    Abstract : Cyberattacker utgör ett stort hot för dagens företag och organisationer, med engenomsnittlig kostnad för ett intrång på ca 3,86 miljoner USD. För att minimera kostnaden av ett intrång är det viktigt att detektera intrånget i ett så tidigt stadium som möjligt. READ MORE

  3. 3. IoT Security Applied on a Smart Door Lock Application

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massar Almosawi; Kristoffer Djupsjö; [2018]
    Keywords : ;

    Abstract : This thesis describes the development of an IOT application based upon Digitizing a smart door lock for making it connected to the internet and able to recognize employees that work in the office. This thesis concentrates primarily on the security aspects by listing the typical security challenges in IOT systems in general and summing these challenges up to develop a functional and secure product from scratch. READ MORE

  4. 4. Leveraging an Active Directory for the Generation of Honeywords

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johan Lundström; [2018]
    Keywords : honeywords; passwords; authentication; password-based authentication; password cracking; deception techniques;

    Abstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE

  5. 5. Operator authentication and accountability for SCADA servers when requests are forwarded by a middle layer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Gomez Gonzalez; [2018]
    Keywords : ;

    Abstract : Due to their critical nature, the actions performed by operators on IndustrialControl Systems (ICS) are subject to source authentication andaccountability. When commands are not send directly by the user, butforwarded by middle servers, the compromise of those severs threatensthe security of the whole architecture. READ MORE