Password protection in IT systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtualization Based Password Protection against Malware in Untrusted Operating Systems

Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, we propose KGuard, a password input protection system. Its security is based on the hardware-based vi...

متن کامل

Prover and Verifier Based Password Protection: PVBPP

In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate ...

متن کامل

Study on Protection Against Password Phishing

Phishing attack is new type of network attach and become a major nuisance on the internet. The rapidly progressof phishing attacksthe present secure socket layer is not able to provide and protect users from fraudulent websites. The attacks have been targeted the non-cryptographic security protocols likeTransport layer security and secure socket layerprotocols. These protocols are not sufficien...

متن کامل

LAPPS: Location Aware Password Protection System

This report describes the design and the implementation of a password protection system that has been proposed as an idea then developed by the author for his undergraduate final year project, at the University of Essex. When designing the system the author has concentrated on adding extra layers of security to the traditional security systems without having to completely replace the existing s...

متن کامل

IT Security Protection at Field Level of Industrial Automation Systems

Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field buses or field devices. Due to resource limitations, existing protective mechanisms can not be deployed to the embedded systems of which the field level is composed. In this contribution, threats against distributed embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the Military University of Technology

سال: 2018

ISSN: 1234-5865

DOI: 10.5604/01.3001.0011.8036