Essays about: "Autentisering"
Showing result 11 - 15 of 80 essays containing the word Autentisering.
-
11. Password Security Assessment of IoT-Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of the IoT (Internet of Things) and the integration of connected devices into our households, IoT security is becoming more important. This technology allows the user to accomplish tasks and store information in a more effective way. READ MORE
-
12. Ethical hacking of a Smart Wi-Fi Plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE
-
13. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE
-
14. Implementation of a component to manage authorization for a web application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Examensarbetet utfördes i samarbete med Klarna i Giessen med syftet att utveckla en komponent i en del av en webbapplikation som hanterar autentisering. Komponenten skulle interagera med auktoriseringstjänsten försedd från Okta tillsammans med korrekt auktoriseringsflöde som en lösning för tillåten användning av webbapplikationen. READ MORE
-
15. Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Microservices have emerged as an attractive alternative to more classical monolithic software application architectures. Microservices provides many benefits that help with code base comprehension, deployability, testability, and scalability. READ MORE