Essays about: "Insecure Passwords"
Found 5 essays containing the words Insecure Passwords.
-
1. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. READ MORE
-
2. Blockchain Applicability in IoT Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Internet of things (IoT) combines sensors and connectivity and can be applied to a wide variety of things. The security in these IoT devices is usually constrained by their limited hardware. When IoT handles sensitive data, security becomes an important challenge. READ MORE
-
3. A Theoretical Proposal of Two-Factor Authentication in Smartphones
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. READ MORE
-
4. Mobile One Time Passwords and RC4 Encryption for Cloud Computing
University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Abstract : Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. Therefore removing the need of providing these services themselves. READ MORE
-
5. User Authentication: Passive USB tokens, an alternative to Passwords?
University essay from IT-universitetet i Göteborg/Tillämpad informationsteknologiAbstract : Most personal computers today employ knowl- edge based user authentication e.g. password pro- tection. Nevertheless, password protection is re- garded as insecure. READ MORE