Abstract Introduction to attacks executed against authentication systems

Abstract

For years, passwords
have been the common procedure for user authentication on computers. However,
as technology advances users are obliged to remember complex, longer and
changing occasionally passwords, it is obvious that a more user friendly and
secured solution for user authentication is requisite. This paper scrutinizes passwords
and biometrics authentication systems and differentiate these systems. We investigate
their efficacy against multiple attacks and aptness for specific security requirements
such as compromisation of detection and non-repudiation. The paper attemps to
offer an extensive picture of how authentication systems work for the purposes
of evaluating correct selection for use and identifying weaknesses in need of additional
research.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

 

Table of Contents

            Abstract                                                                                                                             1

1.           
Introduction                                                                                                                       2

2.           
How authentication systems work

2.1.               
 Password Authentication System

2.2.               
 Biometric Authentication System

3.           
Data protection methods

4.           
Comparison of strengths and vulnerabilities
between systems

5.           
Introduction to attacks executed against
authentication systems

6.           
Table comparing the two authentication
systems

7.           
Recommendation for small/medium business

8.           
Conclusion

9.           
Reference list

 

 

1.  Introduction  

Nowadays online threats and malicious
acts have dramatically increased on the internet affecting its consumers, what’s more, numerous are worried this soaring issue
may suffocate online traffic. Some of these acts are, the increasing ease of
data manipulation by phishers, the increasing portion of malware uses some form
of deception to spread and install unwanted programs on devices which can be
used to aid during an unwanted DDOS (Distributed Denial of Service) attack by
hackers. Internet security is becoming tighter due to these acts requesting
from users more complex password, biometric measurements such as fingerprints
and even a combination of a password and a biometric method. The purpose of
this paper is the evaluation of traditional password and biometric authentication
systems.

2.  How authentication systems
work

There are two authentication systems, traditional password and
biometric systems.

2.1 Password Authentication
System

The password authentication system relationship is between the
user and a system. Passwords strength are a reflation of their creation, the more
complexity they have the stronger they become. In other words, the more variety
of distinctive character types they have and the longer its length, the stronger
the password. Also, 

x

Hi!
I'm Harold!

Would you like to get a custom essay? How about receiving a customized one?

Check it out