logo

Passwords and evaluation of Imperfect Authentication

   

Added on  2022-11-09

7 Pages1587 Words331 Views
 | 
 | 
 | 
Running head: pict311
pict311
Name of the Student
Name of the University
Author note
Passwords and evaluation of Imperfect Authentication_1

pict3111
Passwords and evaluation of Imperfect Authentication
Introduction
There are lots of users whose passwords are hacked because of the 8use of several
imperfect technologies. Passwords can be influenced by the human computer interaction for the
last fifty years. That is why the developers need to develop some user friendly software. many of
the research papers are basically focused on the exact issues that can be easily classified but not
have a great influence on the real world problems. It can be easily understand the entire
authentication and contribution of passwords that is needed to know the situation of today.
Passwords were developed by the developer at the time of 1960 (Arachchilage and Love 2013:
5). It is mainly for the accessing the time framed computers. Many of the practices have survived
with little amount of modifications. It is giving an unpredictable environment related to this. Two
models are selected that can still within the latest password literature. First one is the random
user. It gives the passwords not in a formal way and in independent manner. It is resulted in the
security against the encourage and guess of several procedures aim at the sophiscated users. The
motivation of published research on clean exact problems has caused the neglect of the huge
complexity of real-world Web authentication (Arachchilage and Love 2014:6). This wrong
motivation continues to search the applicability of password research to the practice.
Passwords and evaluation of Imperfect Authentication_2

pict3112
Article Critique
This article enables the readers that importance of the passwords for security issues. The
author conveys several sharing operating systems in the year 1960. It is also said that passwords
are integrate against several practical jokes and also resources that can be very much authorized.
It is also told that there was a Time sharing system at MIT that can first developed the
passwords. Many issues related to this were reported. It is also mentioned that it was an
unencrypted system. That is why anything inside this is not secure. The author tried to say that
designing of several access controls in MULTICS and UNIX in the 1970s passwords are sorted
by using hashed form. But these systems are also unsecured. It is the main reason for causing the
phishing attack (Aleroud and Zhou 2017: 1). The authors are able to communicate about the web
based e-commerce systems that can able to store the passwords by using hash methods. This
article also discusses clearly about the implementation of Secure Socket Layer. By using the
phishing attacks the attacker can able to guess thee passwords in several ways. By using this type
attack the attacker can able to crack all the login credentials of the user. The author discusses that
the current password replacement policies. In this portion it is mentioned that there are the
alternative of thirty five proposed passwords methodology by using the twenty-five comparison.
The developer can use the password managers (Chhikara et al. 2013:6). It is the software that can
remember and automatically typed the passwords that is yield insight. It is able to improve the
usability as well as security in some common case. But these are very much challenging to get all
the agents of the consumers. This problem can be solved by several kinds of graphical password
policy. The author tries to convey that they are providing some policies related to thee biometry.
It will protect the unauthorized framework for authentication of software. Fraudsters want to
implement the digital presentations of the fingerprints as well as iris patterns. The author of this
Passwords and evaluation of Imperfect Authentication_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Testing Theory and Practice
|22
|5270
|250

Password Management System in Python Research Paper 2022
|8
|1022
|51

IT Security Countermeasures
|3
|598
|148

Technique of User Authentication Using Numeric OTP Scheme
|4
|795
|391

Advanced Network Security: Cookie Stealing Attack, Cryptography, Ransomware Research
|10
|1527
|359

Ethical Hacking and Penetration Testing : Black box and White box testing
|11
|1241
|36