Essays about: "thesis password"
Showing result 1 - 5 of 51 essays containing the words thesis password.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Web interface for a multi-purpose transmitter
University essay fromAbstract : The project described in this report aims to construct a web interface for a multi-purpose transmitter (MPT). The MPT is a submodule that is meant to be used in future chromatography systems. This bachelor thesis project is done at Cytiva in Uppsala. READ MORE
-
3. The effect of human memory on password behavior : An investigation
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Passwords are widely used as a primary method of authentication and access control, making them a critical component in safeguarding digital assets. However, individuals’ password-related behaviors, such as password selection, memorization, and management, significantly impact the security of their accounts. READ MORE
-
4. Asserting password crackers ability to target Swedish passwords : An analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In today's digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. Unfortunately, this makes password information a prime target for hackers, who can gain access to our entire digital existence. READ MORE
-
5. Password Managers in Digital Forensics
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Digital forensics – the scientific process to draw evidence from digital devices confiscated in a criminal investigation – is constantly adapting to technological changes. A current challenge is the widespread use of encryption that makes classical data retrieval methods obsolete. READ MORE