95 research outputs found

    Resolving the Password Security Purgatory in the Contexts of Technology, Security and Human Factors

    Get PDF
    YesPasswords are the most popular and constitute the first line of defence in computer-based security systems; despite the existence of more attack-resistant authentication schemes. In order to enhance password security, it is imperative to strike a balance between having enough rules to maintain good security and not having too many rules that would compel users to take evasive actions which would, in turn, compromise security. It is noted that the human factor is the most critical element in the security system for at least three possible reasons; it is the weakest link, the only factor that exercises initiatives, as well as the factor that transcends all the other elements of the entire system. This illustrates the significance of social engineering in security designs, and the fact that security is indeed a function of both technology and human factors; bearing in mind the fact that there can be no technical hacking in vacuum. This paper examines the current divergence among security engineers as regards the rules governing best practices in the use of passwords: should they be written down or memorized; changed frequently or remain permanent? It also attempts to elucidate the facts surrounding some of the myths associated with computer security. This paper posits that destitution of requisite balance between the factors of technology and factors of humanity is responsible for the purgatory posture of password security related problems. It is thus recommended that, in the handling of password security issues, human factors should be given priority over technological factors. The paper proposes the use of the (k, n)-Threshold Scheme, such as the Shamir’s secret-sharing scheme, to enhance the security of the password repository. This presupposes an inclination towards writing down the password: after all, Diamond, Platinum, Gold and Silver are not memorised; they are stored.Petroleum Technology Development Fun

    A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access

    Get PDF
    NoThe Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled ‘Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust’. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.Petroleum Technology Development Fun

    Slotted Printed Monopole UWB Antennas with Tuneable Rejection Bands for WLAN/WiMAX and X-Band Coexistence

    Get PDF
    YesFour versions of the compact hexagonal-shaped monopole printed antennas for UWB applications are presented. The first proposed antenna has an impedance bandwidth of 127.48 % (3.1 GHz to 14 GHz), which satisfies the bandwidth for ultra-wideband communication systems. To reduce the foreseen co-channel interference with WLAN (5.2GHz) and X-Band systems (10GHz), the second and third antennas type were generated by embedding hexagonal slot on the top of the radiating patch. The integration of the half and full hexagonal slots created notched bands that potentially filtered out the sources of interference, but were static in nature. Therefore, a fourth antenna type with tuneable-notched bands was designed by adding a varactor diode at an appropriate location within the slot. The fourth antenna type is a dual-notch that was electronically and simultaneously tuned from 3.2GHz to 5.1GHz and from 7.25GHz up to 9.9GHz by varying the bias voltages across the varactor. The prototypes of the four antenna versions were successfully fabricated and tested. The measured results have good agreement with the simulated results.This work is carried out under the grant of the Fundacão para a Ciência e a Tecnologia (FCT - Portugal), with the reference number: SFRH / BPD / 95110 / 201

    Compact Microstrip Antenna Design for Microwave Imaging

    Get PDF
    YesAn ultra-wideband microstrip antenna design is considered with respect to applications in breast cancer detection. The underlying design concept is based on ground penetrating radar (GPR). Simulated and measured prototype performance show excellent performance in the input impedance and radiation pattern over the target range from 4 GHz to 8 GHz. The 4 GHz to 8GHz frequency band for microwave imaging perform better in comparison with other microwave frequencies. The antenna also shows a reasonable uniform radiation performance in the broadside direction which contributes to the reduction of clutter levels, thus aiding the reconstruction quality of the final image
    corecore