Essays about: "Kerberos"

Showing result 1 - 5 of 9 essays containing the word Kerberos.

  1. 1. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  2. 2. The Influence of ERM on Strategizing - A case study

    University essay from Göteborgs universitet/Graduate School

    Author : Robert Hänninen; Christina Tsipoulakou; [2019-08-09]
    Keywords : ERM; Enterprise Risk Management; Strategy; Strategizing; Accountants; Management Accounting;

    Abstract : Many have studied how ERM can provide assurance to the achievement of already set strategies (COSO, 2004; 2017; Frigo & Anderson, 2011; Nocco and Stulz, 2006), but few have studied how ERM influences strategizing (Viscelli, Hermanson & Beasley, 2017; Frigo & Anderson, 2011). While Viscelli et al. READ MORE

  3. 3. New authentication mechanism using certificates for big data analytic tools

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Paul Velthuis; [2017]
    Keywords : Cloud Access Management; certificate on demand; Apache Spark; Apache Flink; Kerberos; transport security layer TLS ; Authentication; Multi Factor Authentication; Authentication for data analytic tools; certificate based Spark authentication; public key encryption; distributed authentication; short valid authentication;

    Abstract : Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. READ MORE

  4. 4. Comparison of Methods of Single Sign-On : Post authentication methods in single sign on

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Baran Topal; [2016]
    Keywords : SSO; Single sign-on; SAML; authentication; security; behavior; risk; SSO; Single sign-on; SAML; autentisering; säkerhet; beteende; risk;

    Abstract : Single sign-on (SSO) is a session verification mechanism that allows a client to use a single password and name combination to be able to access multiple applications. The mechanism validates the client for all the applications and eliminates the need for authentication prompts when a user switches between applications within a session. READ MORE

  5. 5. Single Sign-On : Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects

    University essay from Institutionen för datavetenskap (DV)

    Author : Ece Cakir; [2013]
    Keywords : SSO; information security; authentication; federated identity; multi-factor authentication; MoDAF framework; SAML; LDAP; certificate authority; kerberos; shibboleth; SSO architectures; risk evaluation.;

    Abstract : Main concern of this thesis is to help design a secure and reliable network system which keeps growing in complexity due to the interfaces with multiple logging sub-systems and to ensure the safety of the network environment for everyone involved. The parties somewhat involved in network systems are always in need of developing new solutions to security problems and striving to have a secure access into a network so as to fulfil their job in safe computing environments. READ MORE