The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article observes ways and techniques that can be used to gain access to MySQL databases. HoneyPot that simulates main MySQL server functions was built in order to collect data about attacks. There is gathered a password dictionary that was collected based on attempts to gain access to MySQL HoneyPot. There are diagrams, that show distributions of attacks number at a specific time and region,...
Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize...
Increased usage of multilevel security is noticed along with a rise in vulnerabilities for password based authentication. This is a level III security protection by authentication, which uses handwritten signature using mouse movement. User mouse behavioral pattern based security is a paradigm for online security layers. It uses digital signature to establish authentication with a secure system. The...
This paper studies the current status and advance of study of password cracking. First, we give a classification for password cracking from different dimensions. We studies brute-force cracking, dictionary cracking and rainbow table cracking. We found some new techniques such as brute-force cracking based on probability method, Markov models and data mining. High performance computing in password...
In recent times, cyber-attacks and cyber warfare have threatened network infrastructures from across the globe. The world has reacted by increasing security measures through the use of stronger passwords, strict access control lists, and new authentication means; however, while these measures are designed to improve security and Information Assurance (IA), they may create accessibility challenges...
The Digital Library of the security threatsfacing and the reasons, according to OSI securityarchitecture, examining the safety and security objectivesof digital library, based on the principle of new casks,from the security strategy of several major Digital Libraryin the process of data security issues and proposeappropriate safety measures and solutions, is intended tostrengthen the library data...
With the development of computer technology, especially the rapid development of the network, information security is becoming more and more important. In practical applications, access control is the system security technology implement of security policy. It manages all the access request of resource according to the security policy and determines the access request of resource authorities whether...
Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to...
Remote user authentication is used to validate the legitimacy of a remote log-in user. Due to the rapid growth of computer community, many network architectures are becoming multi-server based. Recently, there have been many remote password authentication schemes proposed for securing multi-server environments. These schemes used either a nonce or a timestamp technique to prevent the replay attack...
When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are...
With the popularity of network education and the development of network information management technology, the application of E-school system based on network becomes more and more extensive. On this open condition of web, the need of security of E-school management information system accordingly is higher than before. Considering on this, this article has brought out a series of security problem-solving...
Nowadays, in most of the unauthorized internet access monitoring systems, there is no satisfactory method on access control with USB storage device. The common way is to take off the USB port from the computer to prohibit the use of USB storage devices. This method directly leads to lose the convenience by using USB storage devices, and also no longer be able to use other equipment based on the USB...
Advances in the field of information technology also make information security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters...
Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative solution...
In the specification of trusted platform module (TPM), object-independent authorization protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are many TPM manufacturers having made their own TPM. However, some of the TPM manufacturers don't implement the TPM completely according to the specification of TPM. In this paper, BAN...
The flow of information security is commonly controlled by different trust domains in the distributed environment. The information sharing in a unique trust domain, however, is also an essential issue to be further studied. Fortunately, the trusted computing technology provides a nice solution to elaborate the security of information sharing in the same trust domain. In this paper, trusted terminal...
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative solution...
The cryptology course is an important curriculum of the major in information security and the interrelated majors. The teaching mode based on theory- algorithm-practice-application in cryptology course is proposed by combining the characteristic of cryptology course, the teaching experience and the scientific research experience in this paper. The practice proved it can improve the studentpsilas ability...
The unprecedented increase of potential threats to computer systems serves as a premise to the prioritisation of security within end-user systems and applications. Organisations and institutions design different ways of providing security to their systems. Antivirus software and passwords are the common tools used to achieve security. However, the traditional use of passwords for information security...
Spywares has become major problem now days. This type of software may track user activities online and offline, provide targeted advertising and/or hold in other types of uninvited activities. Password collection by spywares is increasing at a shocking pace [1]. The problem of entering sensitive data, such as passwords, from an untrusted machine, is obviously undesirable, however roaming users generally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.