1,039 research outputs found

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe

    On Issues, Strategies and Solutions for Computer Security and Disaster Recovery in Online Start-ups

    Get PDF
    Vast majority of entrepreneurial ventures want an online and offline business model. Quite a good number would prefer their dealings occur strictly online. However, very few know what it takes to aim at achieving 99.999% availability, this is a key goal in deploying Computer and information technology (IT) solutions. In this present world of Information Technology there is an increase in threats faced by small medium businesses and enterprise on online platforms. More companies are vulnerable to attacks/threat such as DDOS, Malwares, Viruses, Ransomware etc. Entrepreneurial venture’s adoption of IT solutions with security in view, in addition to a disaster avoidance, mitigation and recovery plan or strategy can help in this respect. This paper suggests such issues to be considered and strategies to adopt in IT security and avoiding disaster and solutions to remedy disaster

    Research on the Rules of Electronic Data Evidence Authentication

    Get PDF
    As a new type of evidence, electronic data has been fully confirmed in the legislative aspects of the three major procedural laws. However, there are still some problems in the judicial level, such as the lack of unity of meaning, the uncertainty of attribution and the lack of certification standards. The lack of certification standards is the most intractable problem. In this paper, the author uses the method of theoretical research and empirical research to analyze the judicial application of electronic data evidence, the existing problems, the causes and the corresponding solutions. The author suggests that the electronic data authentication specification should be set up as soon as possible, and the concrete practical work of the judges should be guided from two aspects of principles and rules, so that the concept of judicial standardization and the concept of free heart proof of judges are fully played in the field of electronic data evidence application

    Authentication : can mobile environments be secured?

    Get PDF
    Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to [email protected], referencing the URI of the item.Includes bibliographical references (leaves 29-32).A mobile system is defined as a network in which one or more of the interconnection links is a wireless medium. Wireless media include but are not limited to, cellular or radio transmissions, satellite services, and wireless computer networks. The fundamental operations of storage, processing, and transmission of information are undergoing such rapid improvement that the application of securing mobile systems cannot keep up with the rate of advance. This research analyzes security problems and investigates possible solutions that stem from the absence of a "fixed" link between the user and service provider in mobile systems. This research approaches all security issues from the authentication standpoint, i.e. the process of reliably verifying the identity of two parties in a communication channel. Once identities have been verified, the channel authenticity must be maintained. Mobile communication systems that utilize three systems, symmetric ciphers, public key systems, and zero-knowledge techniques, are shown to be highly secure. The level security is not degraded due to the absence of a "fixed" link between the user and service provider
    • …
    corecore