Haku
Viitteet 11-16 / 16
Role of IAM in an Organization
(2021)
Many identities are possessed by the user in this digital world. The access rights and the
digital identities requires to be managed and controlled at all levels. Managing the identities and controlling the access rights ...
What is Zero Trust: and How Can It Be Implemented?
(2022)
In this thesis I write about Zero Trust and how it can be implemented.
The purpose for that is to be more knowledgeable within IAM and explain why in today's IT it is no longer as safe to use standard user credentials for ...
Privileged access management model for a managed service provider
(2023)
Managed service providers operating as administrators in multiple customer environments need well-defined and secure means of providing access to their employees. The distinctive characteristic of a service provider’s ...
Root Cause Analysis of Failure of Electromechanical Locks on Doors in Nuclear Installations
(2023)
The safe operation of nuclear power plants is vital to the survival of the nuclear power industry. The safety approach taken by nuclear installations ensures that their activities do not cause harm to employees, the public, ...
SmartAccess: Developing a Secure Access Control System Mobile Interface
(2024)
The goal of this project was to design and develop a secure access control user interface that allows apartment building residents or authorised personnel to grant temporary access to their buildings by generating four-digit ...
Implementation of Time-Based Access Control in Sailpoint IdentityIQ
(2024)
Identity Access Management (IAM) systems are essential for modern digital infrastructures, managing user permissions effectively to enhance security and efficiency. KPMG sought to integrate SailPoint's IdentityIQ, focusing ...




