Sökning: "two-factor authentication 2fa"

Hittade 4 uppsatser innehållade orden two-factor authentication 2fa.

  1. 1. Masquerader Detection via 2fa Honeytokens

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Anton Wiklund; [2021]
    Nyckelord :Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER

  2. 2. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Jakub Porubsky; [2020]
    Nyckelord :mobile payments; m-payments; biometrics; fingerprint; face recognition; 2FA;

    Sammanfattning : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. LÄS MER

  3. 3. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform

    Kandidat-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Niklas Tellini; Fredrik Vargas; [2017]
    Nyckelord :Two-Factor Authentication; Security; One-Time Passwords; Access control; Digital Assessment Platform; Två-stegs autentisering; Säkerhet; Engångslösenord; Åtkomst kontroll; Digital bedömningsplattform;

    Sammanfattning : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. LÄS MER

  4. 4. Autentiseringsprocesser i molnbaserade datortjänster

    Kandidat-uppsats, Malmö högskola/Fakulteten för teknik och samhälle (TS)

    Författare :Richard Göthesson; Gustav Hedman; [2016]
    Nyckelord :molnbaserade datortjänster; autentiseringsattacker; autentisering; Microsoft Azure; Google Cloud Platform; Amazon Web Services; authentication; cloud computing; guidelines; authentication attacks;

    Sammanfattning : Tidigare forskning har påvisat brister i olika former av autentiseringsprocesser som leder till autentiseringsattacker. Målet med vår studie är att presentera ett antal riktlinjer som företag och privatpersoner kan följa för att minimera risken för autentiseringsattacker. LÄS MER