Sökning: "Security Authentication."

Visar resultat 1 - 5 av 333 uppsatser innehållade orden Security Authentication..

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Nithya Sree Muddychetty; [2024]
    Nyckelord :Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Sammanfattning : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. LÄS MER

  2. 2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Victor Pero; Linus Ekman; [2023]
    Nyckelord :Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Sammanfattning : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. LÄS MER

  3. 3. Evaluating intrusion detection points in an end-to-end solution

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Lilla Pankaczi; [2023]
    Nyckelord :RFID; Random UID; Mutual Authentication; Scyther;

    Sammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER

  4. 4. Choosing authentication protocol for digital signatures : A comparison between SAML and OIDC

    M1-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Pontus Kågström; [2023]
    Nyckelord :OpenID Connect SAML OIDC Security Assertion markup language;

    Sammanfattning : More and more companies are working toward digitizing their workflow and this has increased the necessity of digital signatures.An important part of digital signatures is the authentication process which is heavily regulated for Swedish government agencies by DIGG, DIGG only allows the use of Security Assertion Mark-up Language(SAML) for authentication but are looking into also allowing OpenID Connect(OIDC) and together with Swedish OIDC working group produce a specification. LÄS MER

  5. 5. Stöldskydd i Jordbruket

    Kandidat-uppsats, Linköpings universitet/Institutionen för systemteknik

    Författare :Fabian Coops; Grins Adam; [2023]
    Nyckelord :Elektroteknik; Stöld; LoRaWAN;

    Sammanfattning : This report examines and presents an effective way to alert the owner of a GPS device in case of theft in the agricultural sector. By implementing IR sensors that can be mounted under the object and monitor movements, the owner can receive a warning via SMS and email in case of a potential theft. LÄS MER