Essays about: "authentication methods"
Showing result 1 - 5 of 100 essays containing the words authentication methods.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
3. Authentication challenges for people with neurodevelopmental disorders
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE
-
4. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE
-
5. Formally Verified Remote Attestation Protocols with Strong Authentication
University essay from Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakultetenAbstract : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. READ MORE