Essays about: "thesis active directory"
Showing result 1 - 5 of 10 essays containing the words thesis active directory.
-
1. Improving efficiency of standardized workplace processes through automatization utilizing scripts : Using PowerShell to optimize onboarding
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As companies continue to rely more and more on information technology (IT) infrastructure, automation of most processes become increasingly viable as a way of improving efficiency and cutting costs. One such application area is staff and user management. READ MORE
-
2. Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Cyberattacker utgör ett stort hot för dagens företag och organisationer, med engenomsnittlig kostnad för ett intrång på ca 3,86 miljoner USD. För att minimera kostnaden av ett intrång är det viktigt att detektera intrånget i ett så tidigt stadium som möjligt. READ MORE
-
3. IoT Security Applied on a Smart Door Lock Application
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis describes the development of an IOT application based upon Digitizing a smart door lock for making it connected to the internet and able to recognize employees that work in the office. This thesis concentrates primarily on the security aspects by listing the typical security challenges in IOT systems in general and summing these challenges up to develop a functional and secure product from scratch. READ MORE
-
4. Leveraging an Active Directory for the Generation of Honeywords
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE
-
5. Operator authentication and accountability for SCADA servers when requests are forwarded by a middle layer
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to their critical nature, the actions performed by operators on IndustrialControl Systems (ICS) are subject to source authentication andaccountability. When commands are not send directly by the user, butforwarded by middle servers, the compromise of those severs threatensthe security of the whole architecture. READ MORE