Browsing Computer Science Masters Papers by Subject "Computers -- Access control."
Now showing items 1-1 of 1
-
Threat Identification from Access Logs Using Elastic Stack
(North Dakota State University, 2020)Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...