Preview

Password Theft

Powerful Essays
Open Document
Open Document
6445 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Theft
1. INTRODUCTION

1.1. History of Authorization System

The security of digital data has long been a concern of operating system designers. The first time-sharing systems in the early 1960s had password schemes as part of logging in, memory protection hardware, and access control lists on files. By 1970, the means to assure security and protection were considered fundamental to operating systems and were an important consideration in the design of OS kernels.

Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system administrator and the actual checking of the permission values that have been set up when a user is getting access.

Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten.

Histories listed below are numbers of major events along the way of authorization system since it had been introduced:

1.1.1. One-way Functions to Protect Passwords (1967)

The authentication system (used during login) stores enciphered images of user passwords but not the actual passwords. This protects passwords from being divulged if an attacker happens to read the file.

1.1.2. Public key Cryptography and Digital Signatures (1976)

Public-key cryptography enables two people to communicate



Bibliography: Beaver, K. and McClure, S., "Hacking For Dummies", Wiley Publishing, Indiana, 2004, 339 pages

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    Role-based access control (RBAC) is an access policy determined by the system, not the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of…

    • 508 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT 1230 FINAL EXAM REVIEW

    • 542 Words
    • 2 Pages

    used to make sure that you don’t reuse the same password when changing the password? Enforce Password History…

    • 542 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant is that passwords can often be stolen, accidentally revealed, or forgotten.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Bus 599 Paper

    • 1454 Words
    • 6 Pages

    Through this paper, one will understand the trends in the global beer market. There will also be the possibility of Modelo’s international expansion. There will also be an assessment about the next foreign market that Modelo should get involved with. A decision about the challenges that Modelo faces from their competition InBev and how Modelo should respond to this beer industry giant is presented in this paper. Last but not least, a discussion about weather or not Modelo should diversify their business is stated in this paper.…

    • 1454 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Companies increase security by providing log in and password verification system for each of their employees that need to access their data.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 5 Bsa/310

    • 4336 Words
    • 18 Pages

    Take the following analogy as an example: A single workstation computer. No network card. This workstation is in a sealed room with no windows, only a single overhead halogen light and a single ventilation duct. There is an armed guard who verifies the user upon entrance to the foyer of the sealed room. To get into the sealed room requires a fingerprint scan, a retinal scan, and voice recognition. Once inside, there is only one user in the world that is authorized and has access to this computer. To log in to the system, the user must log in using biometrics and a password.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    User accounts and passwords provide a level of authentication for employees and is what allows these employees to gain access to a company computer or the ability to log in to a company server or other resource. Each employee should be given a unique username that is different from every other employee, and each employee should create a complex password that is associated with their username. The employee should never give out their password to…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identity Theft

    • 599 Words
    • 3 Pages

    If you find errors on your credit report, what steps would you take to correct them?…

    • 599 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Adobe Pass Case Study

    • 2760 Words
    • 12 Pages

    The following discusses the central entitlement transactions of authentication and authorization. Authentication is the process of confirming with a Pay TV provider that a given user is a known customer. Authorization is the process wherein a Pay TV provider confirms that an authenticated user has a valid subscription to a given resource.…

    • 2760 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    3d password

    • 300 Words
    • 2 Pages

    Therefore the idea of 3D passwords, are more customizable and very interesting way of authentication. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen for e.g. a garage. Now in a day to day garage one will find all sorts of tools, equipments, etc. each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. There can be levels of authentication a user can undergo which can be implemented so as to enhance security.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays

Related Topics