Essays about: "information security accounts"

Showing result 11 - 15 of 20 essays containing the words information security accounts.

  1. 11. Login hardening with Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Michaela Bergman; [2021]
    Keywords : multi-factor authentication; authentication; security; usability; cost; biometrics; biometric authentication; openid connect; oauth 2.0; PKCE; account recovery; security threats; authentication factors; Technology and Engineering;

    Abstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE

  2. 12. Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE

    University essay from Linköpings universitet/Programvara och system

    Author : Matildha Sjöstedt; [2021]
    Keywords : cyber range; monitoring; CRATE; cyber security; cyber security exercises; virtual machine; cyberanläggning; övervakning; CRATE; cybersäkerhet; cybersäkerhetsövningar; virtuell maskin;

    Abstract : In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies,  training of personnel etc., is imperative. READ MORE

  3. 13. Security vs. Usability: designing a secure and usable access control event log

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Vedrana Zeba; Lykke Levin; [2019]
    Keywords : security; usability; event log; access control; GUI; heuristics; user requirements;

    Abstract : Säkerhet och användbarhet beskrivs ofta som motpoler. I detta examensarbete så undersöks möjligheterna till att inkorporera både säkerhet och användbarhet i ett passagekontrollsgränssnitt. Forskningen är fokuserad på den del av passagekontrollen som benämns som händelseloggen. READ MORE

  4. 14. Vilka faktorer värdesätter den potentiella arbetstagaren i det gröna näringslivet högst?

    University essay from SLU/Dept. of People and Society

    Author : Anna Gunnarsson; Filippa Jönsson; [2018]
    Keywords : strategier; gröna näringslivet; arbetstagare; arbetsgivare; värderingar; ledarskap; målstyrning;

    Abstract : Lantbruket står inför en problemställning då det är ett stort minskat intresse för att studera på naturbruksprogrammet på gymnasienivå. Det gör således att ung arbetskraft med gymnasial bakgrund inom det gröna näringslivet minskar. READ MORE

  5. 15. The Use of Facebook by Georgian Queer Activists: Compromised Empowerment and New Challenges

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Lasha Kavtaradze; [2018]
    Keywords : Empowerment; ICTs; Queer; Activism; Community Psychology; Facebook;

    Abstract : In Georgia, a country with a post-soviet past and a long path of geopolitical struggles that is transitioning into a liberal democracy, queer people remain as one of the most oppressed groups of the society. Despite the hostile environment, there are several openly queer activists who fight against the oppression on a daily basis. READ MORE