StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

What will replace passwords - Research Paper Example

Cite this document
Summary
The entry of the internet in the market has revolutionalized the way people interact and driven the financial development through providing a platform for transacting businesses. With the increasing levels of globalization that results mainly from liberalization of markets,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
What will replace passwords
Read Text Preview

Extract of sample "What will replace passwords"

Download file to see previous pages

At the same time, social media has created a medium for people to interact and share their personal information with other people located in different parts of the world. Countries have democratized the use of technology in order in order to sustain the stream of development that can be accrued from the use of the internet. It is now evident that the expanding of cyberspace is bringing new opportunities and at the same time; new threats. While the cyberspace is encouraging open markets and open social orders, the openness of this space has exposed the people towards cyber attacks.

Many of the countries have tried to protect their people against the attacks. However, the technological sector is evolving very fast, an aspect that is making it very hard for the institutions that have been put up to deter the attacks to keep up with the changes. The internet providers and social media companies have not been able to put up stern measures to avoid the attacks. A cyber-attack is the conscious misuse of computer frameworks, technology-ward endeavours, and systems. Cyber-attacks use pernicious code to modify computer system, rationale, or information, bringing about troublesome results that can trade off information and lead to cyber crimes, for example, data and wholesale fraud (Wilson, 2014).

Cyber-attacks were originating from various distinctive sources and varieties. There are different procedures to use in cyber-attacks and an assortment of approaches to control them to people or foundations on a more extensive scale. Attacks are broken down into two classes, Syntactic attacks, and Semantic attacks. Syntactic attacks are direct; it is viewed as vindictive software which incorporates viruses, worms, and Trojan stallions. A standard computer virus, presumably the most widely recognized type of a cyber-attack, may addition beginning to access to a computer or framework in two ways: remotely or proximately.

A few viruses, for example, Conficker, spread through a

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“What will replace passwords Research Paper Example | Topics and Well Written Essays - 2750 words”, n.d.)
What will replace passwords Research Paper Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/management/1682746-what-will-replace-passwords
(What Will Replace Passwords Research Paper Example | Topics and Well Written Essays - 2750 Words)
What Will Replace Passwords Research Paper Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/management/1682746-what-will-replace-passwords.
“What Will Replace Passwords Research Paper Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/management/1682746-what-will-replace-passwords.
  • Cited: 0 times

CHECK THESE SAMPLES OF What will replace passwords

Password Cracking Systems

hellip; Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a communication network.... In this scenario, the majority of verification systems are basically dependent on secret passwords.... But unluckily, the uncertainty and extent of user selected secret passwords to turn out to be permanent even after a long period.... Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a communication network....
20 Pages (5000 words) Research Paper

Database Security for Electronics Ltd

SQL injection attack is a type of attack that comes from what the user has input, and is not well checked to find if the input is valid.... This case study "Database Security for Electronics Ltd" discusses a database as the collection of the information which is organized in order to be accessed easily; it can be managed and, being updated....
8 Pages (2000 words) Case Study

The Uses of Basic Cryptography in My Organization

The decryption of data was initially enabled through passwords but, a number of incidents proved this an unreliable decryption method.... As the IT director noted, while many security systems are designed in such a way that the entire security of the website depends upon secret passwords, the fact is that the password system is riddled with shortcomings.... As a means of bypassing this limitation, people tend to pick and use very simple passwords which can easily be broken by password cracker programmes....
4 Pages (1000 words) Essay

One Time Passwords

This basic principle of an OTP solution effectively protects the system against replay attacks, or… ny attack that attempts to use an intercepted password, hence, making it difficult for potential intruders to gain unauthorized access to the system (Bhaiji, 2009). Mathematical algorithm: In this type, the system requires an initial seed (PIN or pass phrase) to generate The new passwords are generated by the system using a one-way hash function (Bhaiji, 2009).... Since new passwords are based on a challenge mechanism instead of being based on previous password, this type offers more security as compared to mathematical algorithm type (Bhaiji, 2009)....
5 Pages (1250 words) Research Paper

Social Engineering: Examining the Latest Scams

In addition, it is normally established on that “clients are the fragile link” in safety as well as this standard is what formulates social engineering practicable (TechTarget, 2009; Allen, 2006).... In scenario of computer security, social engineering is a paradigm that illustrates a non-technical type of interruption that depends significantly on human interaction as well as frequently engages scamming other people to break standard security measures....
17 Pages (4250 words) Essay

Securing Windows and Unix/Linux Servers

trong passwords are vital in maintaining the security of network servers and are ones that are hard to guess.... It is, therefore, important to advise users to come up with strong passwords.... In some cases, it is vital that network server administrators install password policies that ensure all passwords used in their networks meet a set of standards (Shelly & Vermaat, 2010)....
3 Pages (750 words) Case Study

Network Security, the Heartbleed Bug

This jeopardizes the secret keys used to pinpoint the service providers and to encode the movement, the names and passwords of the users and the authentic content.... Hence, permitting the stealing of the servers digital keys used to encrypt data and gain access over users session cookies and passwords (BBC News, 2014)....
4 Pages (1000 words) Essay

Transcorp Company System Security

This type of security uses passwords to systems and files as well as locking systems @2010Systems security-Option 2Introduction Transcorp Company, a transport company uses the break-in security in the management of its systems for security purposes.... This type of security uses passwords to systems and files as well as locking systems in offices together with managing modem dial-in.... Personal information includes passwords, credit card numbers aqnd bank account numbers (Frenzel, 1999)....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us