Essays about: "Two factor authentication"

Showing result 1 - 5 of 22 essays containing the words Two factor authentication.

  1. 1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Fawad Ahmad; [2024]
    Keywords : ;

    Abstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE

  2. 2. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  3. 3. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE

  4. 4. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Asier Iriarte Murgiondo; [2022]
    Keywords : authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Abstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE

  5. 5. Ethical hacking of a Smart Wi-Fi Plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Markus Newton Hedelin; Marcus Samuelsson; [2022]
    Keywords : Bachelor’s thesis; Ethical hacking; Penetration testing; Internet of things; Smart plug; Mobile application; Cloud service; Kandidatexamensarbete; Etisk hackning; Penetrationstestning; Sakernas internet; Smart uttag; Mobilapplikation; Molntjänst;

    Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE