Essays about: "information security accounts"
Showing result 1 - 5 of 20 essays containing the words information security accounts.
-
1. Password Management : A Study about Current Challenges with Password Management
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Effective password management is crucial for safeguarding online accounts and sensitive information. This research examines the current challenges and provides alternative solutions for better password management. This study encompasses a comprehensive survey and interviews conducted with individuals across various professional backgrounds. READ MORE
-
2. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
3. Threats and Privacy Breaches Against Internet of Things- and Smart Home Users
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With more parts of our lives going digital than ever before, more parts of our lives are also endangered. Not enough research and studies are done on users and their usage of Internet of Things and Smart Homes, which makes them vulnerable to several risks and attacks. READ MORE
-
4. Perceptions of Authentication Methods; Students and Employees with their job platforms and social media accounts : Study done in Sweden
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The massive use of data on the cyberspace have led to threats, such as data breach and security harm to individuals and to organization. Authentication methods are one of the mitigations of these threats and used to ensure that each of the individuals on the cyberspace is keeping their own or organizational data secured. READ MORE
-
5. Enclave Host Interface for Security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE