Essays about: "Honeytokens"

Found 3 essays containing the word Honeytokens.

  1. 1. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Dillon Jonsson; Amin Marteni; [2022]
    Keywords : Multi-factor Authentication; Browser Fingerprinting; Graphical Passwords; Honeytokens;

    Abstract : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. READ MORE

  2. 2. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE

  3. 3. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE