Preview

3-D Password for More Security

Best Essays
Open Document
Open Document
3600 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3-D Password for More Security
ADVANCED E-SECURITY CP5603 MINOR RESEARCH REPORT

Submitted By: Neeraj Kumar
MIT-MBA
Student ID. : 12682310

TABLE OF CONTENTS
Title Page no
ABSTRACT 3
INTRODUCTION 2-6
1.1 Authentication 5
1.2 Authentication Methods 5-6
1.3 Organization of the Report 6
ACTUAL RESEARCH WORK 7-8
3D PASSWORD SYSTEM
2.1 Overview 7
2.2 Innovative Component 7-8
2.3 Comparison with Current Authentication Systems 8
IMPLEMENTATION OF THE 3D PASSWORD 9-16
3.1 Virtual Object Recognition 9
3.2 3D Password Selection and Inputs 10-13
3.3 3D Virtual Environment Design Guidelines 14-16
APPLICATIONS 17-18
4.1 Advantages 18
CONCLUSION



References: [1] X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annual . Comput. Security Appl. Conf., Dec. 5–9, 2005, pp. 463–472. [2] D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security, in Proc. USENIX Security Workshop, 2008, Measurement,VOL. 57,September 2008. [3] NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003. [4] T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). ATMMarketPlace.com. [6] G. E. Blonder, “Graphical password,” U.S. Patent 5 559 961,Sep. 24, 1996. [7] http://en.wikipedia.org/wiki/3-D_Secure

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Password Security

    • 262 Words
    • 3 Pages

    Use at least one of these special characters: ! @ # $ % * ( ) - + = , < >…

    • 262 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Cyber-Ark’s 2012 Trust, Security & Passwords survey is the sixth in a series of annual surveys focused on identifying key security trends amongst IT workers. The survey assesses the extent to which privileged accounts and passwords are being protected in organizations today, and also provides insight into the core threats that exist and the measures being taken to defend systems. The survey report is the result of interviews with 820 IT managers and C-level professionals across North America and EMEA, primarily from enterprise companies. The security landscape continues to evolve – businesses can no longer simply focus on securing the network perimeter in hopes of keeping attackers out. As the enterprise perimeter dissolves, and reports of internal and external threats increase, privileged access points have emerged as the primary target for enterprise attacks. Privileged…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    References: Crume, J. (2000). Inside Internet Security: What Hackers Don’t Want You to Know. Great Britain: Pearson Education Limited.…

    • 1915 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20:…

    • 21530 Words
    • 87 Pages
    Powerful Essays
  • Good Essays

    Password Cracking

    • 794 Words
    • 4 Pages

    Dan Goodin. (Aug 2012). Why passwords have never been weaker – and crackers have never been…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kevin Rogers ‘Developments in Australian Strategic Criminal Intelligence’ in Ratcliffe (ed) Strategic Thinking in Criminal Intelligence (Sydney: The Federation Press, 2004), p23.…

    • 5163 Words
    • 21 Pages
    Good Essays
  • Satisfactory Essays

    How to Hack

    • 1604 Words
    • 7 Pages

    * Maximum Security I or II: this is not a guide to hacking, despite what you might have heard, but…

    • 1604 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    HE quest for a reliable and convenient security mechanism to authenticate a computer user has existed since the inadequacy of conventional password mechanism was realized, first by…

    • 12716 Words
    • 51 Pages
    Good Essays
  • Satisfactory Essays

    The development of CrypTool was started back in 1998, by a group of German companies and universities, but now is an open source project. More than sixty people worldwide contribute regularly to the project. The goal of the CrypTool is to help ensure users are aware of how cryptography can help against network security threats and also explains the underlying concepts of cryptology. The software is available in English, German, Polish, Spanish, and Serbian (Wikia.com, 2013).…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It - Home and Leisure

    • 2734 Words
    • 11 Pages

    The article is about apartment blocks in South Korea that have been built with smart technology. These smart homes allow the people who live there to control the appliances using a control panel. Using a remote, the person can access the IT system from outside and this is all with a system called HomeNet. Bills are paid automatically, using the person’s bank details which are held in a database in the control panel. This was designed to make life easier.…

    • 2734 Words
    • 11 Pages
    Good Essays