Essays about: "Passwords"

Showing result 16 - 20 of 76 essays containing the word Passwords.

  1. 16. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Dillon Jonsson; Amin Marteni; [2022]
    Keywords : Multi-factor Authentication; Browser Fingerprinting; Graphical Passwords; Honeytokens;

    Abstract : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. READ MORE

  2. 17. Threats and Privacy Breaches Against Internet of Things- and Smart Home Users

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Alva Karlborg; Adam Wiktorsson; [2022]
    Keywords : Privacy; Security; Threat; Attack; Internet of Things; Smart Home; User; Internet; Integritet; Säkerhet; Hot; Attack; Sakernas internet; Smart hem; Användare; Internet;

    Abstract : With more parts of our lives going digital than ever before, more parts of our lives are also endangered. Not enough research and studies are done on users and their usage of Internet of Things and Smart Homes, which makes them vulnerable to several risks and attacks. READ MORE

  3. 18. Panic buttons, shrugged shoulders and drowning email inboxes : Stories of account takeovers and trust

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amalia Berglöf; [2022]
    Keywords : trust; account takeover; online services; user-centered security; förtroende; kontoövertagelse; onlinetjänster; användar-centrerad säkerhet;

    Abstract : Users face many risks while being online, including ones posed by their own actions, such as keeping the same passwords on multiple services. This makes them potential victims of account takeovers, in which a hacker uses stolen credentials to acquire and use accounts for their own benefit. READ MORE

  4. 19. Perceptions of Authentication Methods; Students and Employees with their job platforms and social media accounts : Study done in Sweden

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Sandra Börjesson; [2022]
    Keywords : ;

    Abstract : The massive use of data on the cyberspace have led to threats, such as data breach and security harm to individuals and to organization. Authentication methods are one of the mitigations of these threats and used to ensure that each of the individuals on the cyberspace is keeping their own or organizational data secured. READ MORE

  5. 20. Developing a passwordgenerating software : Regarding password memorability and security

    University essay from KTH/Hälsoinformatik och logistik

    Author : Anton Mogaddam; Khan Muhammad; [2022]
    Keywords : Passwords; keyboard patterns; password memorability; Python; Hashcat; Lösenord; tangentbords mönster; minnesvärdhet för lösenord; Python; Hashcat;

    Abstract : With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. READ MORE