Essays about: "authentication"

Showing result 1 - 5 of 306 essays containing the word authentication.

  1. 1. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Raman Salih; [2021]
    Keywords : ;

    Abstract : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. READ MORE

  2. 2. Contemporary Online Banking Fraud in Norway : A case study

    University essay from Linnéuniversitetet/Institutionen för informatik (IK); Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Daniel Weenås Aspvik; Preben Weenås Aspvik; [2020]
    Keywords : E-banking fraud; Fraud prevention; Fraud techniques; Internet Banking; Internet fraud; Informatics; Information systems; Norway; Online banking fraud; Online security;

    Abstract : Banks are currently battling rising of fraudulent activities as it damages their relationship with their customers. Online banking fraud is decreasing trust and confidence among the customers and decreasing operating performance and increasing cost for the banks. READ MORE

  3. 3. Keystroke dynamics for student authentication in online examinations

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Rebecka Mattsson; [2020]
    Keywords : ;

    Abstract : Biometrics are distinctive for each person, and can not be given away or hacked like a password. Keystroke dynamics is a behavioral biometric characteristic that can be used as a complementary authentication step [1]. In online examinations it is difficult to make sure that each student write their own work. READ MORE

  4. 4. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  5. 5. Email attacks : Investigation about the vulnerability of the Swedish organizations against email threats.

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM); Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Jawdat Kour; Hasan Ahmed; [2020]
    Keywords : Email security; SPF; DKIM; DMARC; DNSSEC; STARTTLS; DANE;

    Abstract : Email is an essential form of communication for organizations. Nevertheless, with so much popularity came many challenges. These emails usually carry sensitive data that might cause significant harm if they get compromised. READ MORE