Preview

Alternatives to Passwords

Good Essays
Open Document
Open Document
800 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Alternatives to Passwords
3. Alternatives
Logging in using user names and passwords are by far the most common way to access modern computer systems. However as we have seen these old methods of user authentication are susceptible to social engineering and new social networks have made this all the more easier. Luckily there are a few alternatives. These include Imaging, security combinations and Biometrics.
3.1 Images
One possible solution to combat many of these problems would be to use images. Using a Deja Vu graphical scheme could strengthen security while keeping the convenience of more traditional methods. This method works with recognition instead of recall which as explained before humans are much better at, for example when you first meet someone you might forget there name a week from now, but there face will stick with you for much longer. The idea is that a user sets up a image portfolio. The types of images the user can select from deeply influences the security of the system, for this reason abstract or random art is used. It was found that if the user could select from a selection of photo’s some photos were selected more than others such as the golden gate bridge which in a study conducted by Usenix nine out of twenty participants selected the golden gate bridge from 100 photos to put in there portfolio. On the other hand using random art the selection of pieces showed no strong patterns that would lead to security vulnerabilities. With so much info available on the internet and the constant threat of social engineering your password or recovery question usually if not always relate to you somehow. Using abstract and random art not only forces your login to not relate to your personal self and likings, but it also decreases the chances of you needing to use any password recovery functions.

PIN Password Art Photo
Failed Logins 5% (1) 5% (1) 0 0
Failed Logins (after one week) 35%(7) 30% (6) 10%(2) 5% (1)
Table 2: % Failed logins (# failed logins/20

You May Also Find These Documents Helpful

  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The Eighteenth Amendment to the Constitution was ratified in January 1919 and executed in January 1920. It banned the “manufacture, sale, or transportation of intoxicating liquors”. This amendment was the finishing touch of decades of realization and fulfillment by organizations such as the Woman’s Christian Temperance Union and the Anti-Saloon League, and was also built upon the dry laws of eighteen states. The Prohibition Amendment had heavy consequences. It categorized the brewing and distilling of alcohol as illegal. It then went on and expanded state and federal governments, inspired new forms of sociability between men and women, and suppressed elements of immigrant and working-class culture. During the Prohibition era’s initial years, amendment supporters were delighted by a drop in arrests for drunkenness,…

    • 977 Words
    • 4 Pages
    Better Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. Explain how photosynthesis and respiration are linked in order to provide you with energy from the food you eat.…

    • 828 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Constitution did not fulfill the ideals expressed in the Declaration of Independence because it gave the government more power than the people. The Declaration of Independence promised that when the government failed the people, that they (the people) could overrule the the government and institute a new one. The Constitution on the other hand takes away rights of the people, and gives the government ultimate power. Although extremely helpful to our society and the way our country is run, the Constitution ultimately strays away from the ideals expressed in the Declaration of Independence.…

    • 659 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Fine Art Restoration

    • 1521 Words
    • 7 Pages

    Any time a work of art comes from an uncertain origin, it should undergo the authentication process. Sophisticated fakes can fool even the experienced collector, thus care should be taken at all times. The authentication process ensures the piece is what the original seller is claiming it to be.…

    • 1521 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Stolen artworks seem to have been a problem staring off many years ago. Some of the main issues causing this are, people often believe they own artworks when they have legal claims, the general services and administration are responsible for artifacts and artworks in federal facilities, and the people who are in charge of the stolen artwork (NSAF) are based on an online database.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    However these methods are not based on any essential attributes of a singular to make a individual identification thus having number of disadvantages like indications may be lost, whipped, forgotten, or inappropriate PIN may be forgotten or guessed by impersonators. Security can be easily broken in these systems when a password is revealed to an illegal user or a card is stolen by an impostor.…

    • 65 Words
    • 1 Page
    Satisfactory Essays