Essays about: "Two-factor Authentication"

Showing result 1 - 5 of 14 essays containing the words Two-factor Authentication.

  1. 1. Ethical hacking of a Smart Wi-Fi Plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Markus Newton Hedelin; Marcus Samuelsson; [2022]
    Keywords : Bachelor’s thesis; Ethical hacking; Penetration testing; Internet of things; Smart plug; Mobile application; Cloud service; Kandidatexamensarbete; Etisk hackning; Penetrationstestning; Sakernas internet; Smart uttag; Mobilapplikation; Molntjänst;

    Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE

  2. 2. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE

  3. 3. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jakub Porubsky; [2020]
    Keywords : mobile payments; m-payments; biometrics; fingerprint; face recognition; 2FA;

    Abstract : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. READ MORE

  4. 4. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem; Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE

  5. 5. Open Source Security Token for Linux

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustav Elin Örtenberg Christoffer Roxbergh Adam Mathiesen Johan Fredriksson Ben Mohammad; [2017-08-10]
    Keywords : FPGA; Linux; Open source; OpenSSL; PAM; RSA; Security; Twofactor; ;

    Abstract : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). READ MORE