Preview

Alternatives to Passwords

Good Essays
Open Document
Open Document
800 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Alternatives to Passwords
3. Alternatives
Logging in using user names and passwords are by far the most common way to access modern computer systems. However as we have seen these old methods of user authentication are susceptible to social engineering and new social networks have made this all the more easier. Luckily there are a few alternatives. These include Imaging, security combinations and Biometrics.
3.1 Images
One possible solution to combat many of these problems would be to use images. Using a Deja Vu graphical scheme could strengthen security while keeping the convenience of more traditional methods. This method works with recognition instead of recall which as explained before humans are much better at, for example when you first meet someone you might forget there name a week from now, but there face will stick with you for much longer. The idea is that a user sets up a image portfolio. The types of images the user can select from deeply influences the security of the system, for this reason abstract or random art is used. It was found that if the user could select from a selection of photo’s some photos were selected more than others such as the golden gate bridge which in a study conducted by Usenix nine out of twenty participants selected the golden gate bridge from 100 photos to put in there portfolio. On the other hand using random art the selection of pieces showed no strong patterns that would lead to security vulnerabilities. With so much info available on the internet and the constant threat of social engineering your password or recovery question usually if not always relate to you somehow. Using abstract and random art not only forces your login to not relate to your personal self and likings, but it also decreases the chances of you needing to use any password recovery functions.

PIN Password Art Photo
Failed Logins 5% (1) 5% (1) 0 0
Failed Logins (after one week) 35%(7) 30% (6) 10%(2) 5% (1)
Table 2: % Failed logins (# failed logins/20

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It takes a great deal of effort to encode things into memory. It does not always consist of repetition. There is a difference in an automatic response and something you have to work at. Drinking when thirsty is an automatic response, as opposed to riding a bicycle take concentration and you need to put the steps into memory. People tend to process information differently. Two individuals can watch the same video and gather different bits of information but both correctly state the main point of the video. Simply trying to remember things by simple repetition simply will not do. When choosing a password, people tend to choose something that has meaning to them so they will not forget it. I tend to use one of three passwords in different variations and I tend to forget them until I request a password reset.…

    • 311 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Fine Art Restoration

    • 1521 Words
    • 7 Pages

    Any time a work of art comes from an uncertain origin, it should undergo the authentication process. Sophisticated fakes can fool even the experienced collector, thus care should be taken at all times. The authentication process ensures the piece is what the original seller is claiming it to be.…

    • 1521 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Stolen artworks seem to have been a problem staring off many years ago. Some of the main issues causing this are, people often believe they own artworks when they have legal claims, the general services and administration are responsible for artifacts and artworks in federal facilities, and the people who are in charge of the stolen artwork (NSAF) are based on an online database.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    However these methods are not based on any essential attributes of a singular to make a individual identification thus having number of disadvantages like indications may be lost, whipped, forgotten, or inappropriate PIN may be forgotten or guessed by impersonators. Security can be easily broken in these systems when a password is revealed to an illegal user or a card is stolen by an impostor.…

    • 65 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    individuals would take the time to understand the points behind certain types of artwork. So…

    • 1175 Words
    • 5 Pages
    Good Essays