Sökning: "Strong Authentication"

Visar resultat 1 - 5 av 33 uppsatser innehållade orden Strong Authentication.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Nithya Sree Muddychetty; [2024]
    Nyckelord :Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Sammanfattning : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. LÄS MER

  2. 2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Victor Pero; Linus Ekman; [2023]
    Nyckelord :Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Sammanfattning : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. LÄS MER

  3. 3. Att vara smart i det smarta hemmet

    Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Carl-Fredrik Eugen Haupt; Erik Ankarstad; [2023]
    Nyckelord :Smart homes; security; privacy; Internet of Things; IoT; password;

    Sammanfattning : Smart homes are becoming more popular and there are more and more different devices for smart homes being made. Discussions have increased about the low security level of these devices, how much data is shared with companies that provide these services and how that data is used. LÄS MER

  4. 4. Formally Verified Remote Attestation Protocols with Strong Authentication

    Master-uppsats, Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakulteten

    Författare :Johannes Wilson; [2023]
    Nyckelord :;

    Sammanfattning : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. LÄS MER

  5. 5. Utvärdering av användarupplevelsen av att använda bilder som inspiration för att skapa säkra och minnesvärda lösenordsfraser : En utforskning av den mänskliga faktorns potential

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Anton Carlstedt; [2023]
    Nyckelord :;

    Sammanfattning : Passwords are the most common and frequently used authentication mechanism in the world. However, despite years of research and active use in the world, passwords still have many shortcomings and drawbacks. One of the most prevalent challenges of passwords is the difficulty of creating ones that are strong and also easy to remember. LÄS MER