Essays about: "authentication methods"

Showing result 1 - 5 of 100 essays containing the words authentication methods.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  3. 3. Authentication challenges for people with neurodevelopmental disorders

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Patryk Chrzan; [2023]
    Keywords : Authentication; passwords; neurodevelopmental disorders; cybersecurity; disabilities; Autentisering; lösenord; neuropsykiatriska funktionsnedsättningar; datasäkerhet; funktionshinder;

    Abstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE

  4. 4. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE

  5. 5. Formally Verified Remote Attestation Protocols with Strong Authentication

    University essay from Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakulteten

    Author : Johannes Wilson; [2023]
    Keywords : ;

    Abstract : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. READ MORE