Sökning: "Honeytokens"

Hittade 3 uppsatser innehållade ordet Honeytokens.

  1. 1. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Dillon Jonsson; Amin Marteni; [2022]
    Nyckelord :Multi-factor Authentication; Browser Fingerprinting; Graphical Passwords; Honeytokens;

    Sammanfattning : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. LÄS MER

  2. 2. Masquerader Detection via 2fa Honeytokens

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Anton Wiklund; [2021]
    Nyckelord :Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER

  3. 3. Deception strategies for web application security: application-layer approaches and a testing platform

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Mikel Izagirre; [2017]
    Nyckelord :deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Sammanfattning : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. LÄS MER