Essays about: "Honeytokens"
Found 3 essays containing the word Honeytokens.
-
1. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. READ MORE
-
2. Masquerader Detection via 2fa Honeytokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE
-
3. Deception strategies for web application security: application-layer approaches and a testing platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE