Essays about: "authentication security systems"

Showing result 1 - 5 of 94 essays containing the words authentication security systems.

  1. 1. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  2. 2. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  3. 3. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Juan Basaez Serey; [2023]
    Keywords : DRIP; Drone Remote ID; Hyperledger-Fabric; IPFS;

    Abstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE

  4. 4. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE

  5. 5. Acceptance of Biometric Systemsfor User Authentication and Identification

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Mymoon Dobaibi; [2023]
    Keywords : Biometrics Acceptance; Authentication Techniques; User Preferences; Preferred Techniques; User Experiences; User Perception.;

    Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE