logo

Attacking and Protecting Password | Assignment PDF

13 Pages2666 Words254 Views
   

Added on  2019-11-19

Attacking and Protecting Password | Assignment PDF

   Added on 2019-11-19

ShareRelated Documents
Assignment on ITsecurity
Attacking and Protecting Password | Assignment PDF_1
Attacking and protecting passwordTitle: Attacking and Protecting PasswordSubmitted By 1
Attacking and Protecting Password | Assignment PDF_2
Attacking and protecting passwordContentsAbstract:................................................................................................................................................2Introduction:..........................................................................................................................................2Objective:..............................................................................................................................................2What is Password?.................................................................................................................................3Type of Password attacks:.....................................................................................................................3Countermeasures:..................................................................................................................................6Prevention of password with cracking attacks:......................................................................................7Authentication methods used for preserving Passwords:.......................................................................8Conclusion:..........................................................................................................................................10References:..........................................................................................................................................102
Attacking and Protecting Password | Assignment PDF_3
Attacking and protecting passwordAbstract:The increasing growth of web services raises the concern of using strong password to keep the information secured on the internet. The growth in innovation in the field of new tools and technologies associated with the flow of web services raises the concern of password attacks. In this paper is to focus on the password, attacks associated with the password, different methods used for password attacks, and others.Introduction:The deployment of the web services makes use of login credential for securely transmission of information to provide the relevant information to the authorised person only. “The password is created by the user according to their choice which they can remind easily” (Garg, 2013). It helps in increasing the efficiency between users and security provided. The knowledge based authentication schemes are used for increasing the effectiveness of the information and the usability program. The development of the password is categorised into two types that are strong passwords and weak passwords. The strong passwords are those passwords which are not easily cracks down by the hackers and the weak passwords are thosepasswords which can be easily cracked by the hackers. “The authentication system is used forproviding information to the authorised person only” (Melicher, 2016). The authorization willbe granted on filling the login credentials details correctly without the expiry of the session. Objective:The objective of this paper is to focus on the password, attacks associated with the password, different methods used for password attacks, and others. The focus is also given on the countermeasures which should be taken to prevent the password from hacking. The discussion will be done on the different authentication methods which are used for preserving3
Attacking and Protecting Password | Assignment PDF_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Attacking and Protecting Password
|9
|1932
|469

OWASP Vulnerabilities: Broken Authentication, Security Misconfiguration, Insufficient Logging & Monitoring
|10
|2534
|1

ITC568 - Cloud Privacy and Security - Assignment
|15
|1619
|198

Software Security Assignment
|5
|999
|61

Privacy and Security Policies for Net Movies Company
|8
|1960
|364

What Is Web Application Security and How Does It Work?
|9
|1856
|13