ADVANCED E-SECURITY CP5603 MINOR RESEARCH REPORT
Submitted By: Neeraj Kumar
MIT-MBA
Student ID. : 12682310
TABLE OF CONTENTS
Title Page no
ABSTRACT 3
INTRODUCTION 2-6
1.1 Authentication 5
1.2 Authentication Methods 5-6
…show more content…
So, they create short, simple, and insecure passwords that are susceptible to attack. Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft. Moreover, the user has to carry the token whenever access required. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning).
In this seminar, present and evaluate our contribution, i.e., the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing
The 3D Password is multifactor authentication plan which merge the advantages of some other authentication schemes. The 3D password is a more customizable and very interesting way of authentication. The 3D Password presents a virtual environment holding various virtual objects. In this, users can interact with objects of environment. The 3D Password is just the combination and the sequence of users interaction that take place in the 3D virtual environment. Virtual objects can be any objects that we experience in real life.
The physical protection of information, personnel, software, buildings and other material resources are the first thing that should be assessed when looking into security, obviously there are unavoidable disasters such as natural disasters, man-made disasters and loss of electricity, air or water but most issues are preventable, by monitoring who has access to what and how much access they have, by locking rooms and PC’s, using person specific swipe cards, bolting computers to desks, having effective CCTV in place, and by having effective monitoring tools an IT team can keep a close eye on valuable data and prevent risks. Electronic security systems are designed to protect against unwanted personnel and they provide free roaming for wanted personnel. An electronic security system is a series of biometric locks, or a single biometric lock. A biometric lock is a system that can provide control of entry (or exit) within a designated area by the use of an electronic locking facility. The most common biometric lock is a pin pad system which is a keypad that requires the exact combinations of keys to open the lock, the keys are generally numbers but can be emphasised as letters, shapes, or sounds. Secondly and commonly are swipe cards which are encoded cards which hold information on the user, there is normally a swipe slot to enter a facility that have chosen to
Portable equipment often doesn't need passwords enabled. Mobile device apparatuses often need passwords on validating clients and control entry should information saved on the gadgets. a large number unit have those specialized foul abilities should backing passwords, particular ID number numbers (PIN), or design screen bolts to Confirmation. Some versatile apparatuses likewise incorporate a biometric spectator to examine a finger impression to verification. However, ane data demonstrates that shoppers sometimes utilize these instruments. Additionally, if clients would utilization A secret key alternately PIN they often decide passwords alternately PINs that camwood make effortlessly decided alternately bypassed, for example, 1234 or 0000.
Biometrics is a method of identifying an individual based on characteristics that they possess, typically physiological features such as a fingerprint, hand, iris, retina, face, voice, and even DNA. Some methods of biometrics security even use multiple physiological features or multimodal biometrics to provide superior security than a single form of biometrics can provide. Why are biometrics important in the field of information security? Biometrics provide a remarkable amount of security for information because biometrics are unique to each person, and thus cannot be lost, copied, or shared with another individual. This security allows for biometrics to provide a means to reliability authenticate personnel. The importance of biometrics can be further divided into the history of biometrics and why it was devised, past implementations of biometrics, current implementations of biometrics, and future implementations of biometrics.
Biometric Authentication refers to the usage of software that looks for physical markers to allow access to a system. Some of the most commonly used physical markers are fingerprints, face-recognition, voice-recognition, and iris-recognition (Williams & Sawyer, 2015). As no two humans are exactly alike biometics are less likely to be hacked, although it is not impossible.
The next step option to further prevent this security will involve restricting access to data by requiring a password, personal identification numbers, or a callback procedure. This approach will restrict logon time to a maximum of 2 minutes; if the computer goes idle for 2 minutes, a login password will be required to gain access to the system. The only problem with previous approach will the redundant need to frequently reenter password, to alleviate this problem associated with redundant authentication, the organization can adopt the use of a biometric method of authentication, for example, the use iris scanner, fingerprint, or an electronic signature (Joos et al, 2010).
A Picture Pass Doodle is designed to provide sufficient security, usability, memorability, and interoperability across devices. The combination of free-form doodles and a background image separates the Picture Pass Doodle from other related works. Free-form doodles can provide greater and can also allow users to be creative. The background image used in Picture Pass Doodles increases memorability by providing cues and reducing the memory load on users. Finally, we can say regarding to the participants results that the Picture Pass Doodle system is a usable and secure system despite taking more time and steps during the registration and login stage. Picture Pass Doodle is a promising login and password protection criteria for the future and therefore further research could be done on the same so that the process becomes more efficient for easy application considering the fast technological development in the world
There many types of biometrics that are known to have success within organizations and government agencies. Some these types include smart card, fingerprint recognition, retinal/iris scanner, hand geometry, and facial recognition. All these types are known to be the most common types but one most also know that just like any other technology, each have their advantages and disadvantages. For example, smart card and fingerprint recognition are the most widely used due to them being cost effective and user friendly. The retinal/iris scanner are very secure but can be expensive to some. Although these technologies can be combined such as the smart card and fingerprint recognition, such as by having an individual insert has smart card into the reader which then will require that individual to place his/her finger on a scanner for a reading. Now let’s use the technologies in a example for access control of the facility that may be best to improve security while also considering cost. First is to implement the smart card which contains an integrated circuit chip. These smart cards work like an identification card but contain a circuit chip that allows for the storing of personal information, photograph of the person and biometrics like
In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become
We live in a world today, in which technology moves at a very rapid pace. Many of these technological advances can be used to make our everyday lives easier and safer. One of these new technologies is Biometrics. Biometrics is the process of measuring a person’s physical properties. This would include measuring things like fingerprints, retinas, odor, vein structure on the back of the hand and many other things. Biometrics is a very important topic because it would create better security precautions for certain places that need to be secure. Biometrics will make our society safer by only allowing authorized people out of secure facilities and by keeping the unauthorized people out. Throughout the rest of this
With large-scale information leaks and system hacks of major companies and industry titans being more heavily covered by the media and drawing public scrutiny, emphasis has been placed on the need for tighter digital and physical security. Some organizations, such as Virginia Tech, have turned to stricter requirements on password protection or dual-authentication in order to provide more security. As the standards for password and item based security, such as Identification Cards or personal phone acceptance, have become more advanced, so to have the systems and techniques of hackers attempting to tamper or steal that information. Virginia Tech has always strived to be a shining beacon for technological advancement and it is this that leads us to believe that it is time to follow the global trend of adopting more secure Biometric scanning systems in order to properly secure sensitive information and physical access across campus.
Touch ID is a secure faster and easier fingerprint sense system that provides access to the device. The fingerprinting innovation peruses the data from any edge and acquires each time the user uses the sensor. The fingerprint touch ID makes utilizing a more drawn out, more perplexing passwords much more commonsense considering that fact that clients won’t need to enter it as often. Touch ID additionally beats the bother of a password based bolt, not by supplanting it but rather by safely giving access to the device inside keen limits and time
Multi-factor authentication is the combination of two or more independent credentials, what the user knows (password), what the users has (house keys) or
Biometric technology offers an alternative to the most used system currently in place in most operations: passwords or personal identification numbers (PIN). Instead of users inputting their password or PIN, users interact with a computer terminal that will scan their finger, face, voice, retina, etc. to identify them. Many of the next generation personal computer systems will have integrated biometric technology so that no external hardware is needed. In the mean time, users can buy small peripherals, like a mouse with integrated biometric technology or a small finger terminal for finger scans, to secure their personal computers.
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.