Nothing Special   »   [go: up one dir, main page]

Password and Authentication (PPT Final)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

PASSWORD AND

AUTHENTICATION
A CYBER SECURITY AWARENESS
PASSWORD AND AUTHENTICATION
A CYBER SECURITY AWARENESS
CONTENTS

 INTRODUCTION
 PASSWORDS MANAGEMNET IN CYBER SECURITY
 PASSWORD HASH SALTING
 SUITABLE PASSWORD
 AUTHENTICATION
 MULTI-FACTOR AUTHENTICATION
 GRAPHICAL PASSWORD AUTHENTICATION
INTRODUCTION

 CYBER SECURITY –
It refers to a set of techniques used to
protect the integrity networks, programs and
data from attack, damage or unauthorized
access.
There are many different ways that an
attacker can infiltrate an IT system and most
of them rely on pretty similar techniques
One of them is Password attack
PASSWORD MANAGEMENT IN CYBER SECURITY

 Methods to Manage Password


1. Strong and long passwords
2. Password Encryption
3. Make the password pass the test
4. Updating passwords frequently
PASSWORD HASH SALTING

A more secure way to store a password is to


transform it into data that cannot be
converted back to the original password.
This mechanism is known as hashing.

Key points in Hashing :


1.Slight changes will produce an entirely
different hash value
2. Hash is similar to a fingerprint
SUITABLE PASSWORD

BRUTE FORCE ATTACK


Brute-force attack is an attempt to discover a
password by systematically trying every possible
combination of letters, numbers, and symbols
until you discover the one correct combination
that works. 
CHANGING PASSWORDS

 WHEN SHOULD WE CHANGE OUR PASSWORDS ?


1. If You Suspect Unauthorized Access.  
2. If You Discover Malware or Other Phishing Software.
3. Shared Access.
4. Logging in at Public Places.
5. If You Haven’t Logged in for A While. 
DO’s and DON’Ts IN PASSWORD HABITS
AUTHENTICATION

Authentication is the process of determining


whether someone or something is, in fact, who or
what it says it
 Verify the identity of a user , process or device
 Verifyingpermission to access an electronic device or
computer network
AUTHENTICATION AUTHORIZATION and
ENCRYPTION

AUTHENTICATION
•Authentication is used by a server when the server needs
to know exactly who is accessing their information or site.
•Authentication is used by a client when the client needs
to know that the server is system it claims to be.

AUTHERIZATION
•Authorization is a process by which a server determines if
the client has permission to use a resource or access file.

ENCRYPTION
•Encryption involves the process of transforming data so
that it is unreadable by anyone who does not have a
decryption key.
MULTI-FACTOR AUTHENTICATION

 Knowledge-based authentication factor


Something You Know ( password )
 Location-based authentication factor
Something you have ( OTPs , Smart card)
 Behavior-based authentication factor
 Something You are ( Fingerprint or Biometric method )
GRAPHICAL USER AUTHENTICATION

 It is a form of authentication using images rather than letters, digits, or


special character
GRAPHICAL USER AUTHENTICATION

 Advantages
1. User-friendly
2. Provides high security
3. Dictionary attacks are infeasible
 Disadvantages
1.Registration and login take too long
2.Requires more storage space because of images
THANK
YOU

You might also like