Sökning: "two-factor authentication 2fa"
Hittade 4 uppsatser innehållade orden two-factor authentication 2fa.
1. Masquerader Detection via 2fa Honeytokens
Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER
2. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. LÄS MER
3. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform
Kandidat-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. LÄS MER
4. Autentiseringsprocesser i molnbaserade datortjänster
Kandidat-uppsats, Malmö högskola/Fakulteten för teknik och samhälle (TS)Sammanfattning : Tidigare forskning har påvisat brister i olika former av autentiseringsprocesser som leder till autentiseringsattacker. Målet med vår studie är att presentera ett antal riktlinjer som företag och privatpersoner kan följa för att minimera risken för autentiseringsattacker. LÄS MER