11,995 Hits in 4.9 sec

Online Privacy and Security - Part 2: Encrypted Devices and Account Security [article]

Alex Hyer
2018 Figshare  
This presentation covers how to generate and manage good passwords, use two-factor authentication, and encrypt devices. The concept and use of TOR is also included at the end.  ...  manager -Can also store notes -Only need to know one passwordPassword generator • Highly resistant to brute force attacks • Firefox plugins • Good Android apps • No online service  ...  • Need programs to generate passwords • Reused passwords are non-random • l33t and personal data are not random Traditional Password • Lots of entropy in little space -Good for online accounts • Length  ... 
doi:10.6084/m9.figshare.6963038 fatcat:sbnbt4vwvbdnxnqpgaugni5e5a

Password Managers—It's All about Trust and Transparency

Fahad Alodhyani, George Theodorakopoulos, Philipp Reinecke
2020 Future Internet  
Password managers appear to be a promising solution to help people handle their passwords.  ...  A password is considered to be the first line of defence in protecting online accounts, but there are problems when people handle their own passwords, for example, password reuse and difficult to memorize  ...  Acknowledgments: The authors would like to thank the 30 participants who took part in the usability test and interview study, as well as the 247 anonymous participants who completed the online questionnaire  ... 
doi:10.3390/fi12110189 fatcat:h2hkg6npyfgezhb3qct6k5vtxa

Dual Layer Secured Password Manager using Blowfish and LSB

Raaj Ahuja, Mukesh Ramrakhyani, Bunty Manchundiya, Sonal Shroff
2016 International Journal of Computer Applications  
In this paper, a Password Manager, an Android Application is proposed.  ...  A typical password manager uses database to store all login credentials but our proposed approach replaces database with image and stores all login credentials inside an image and in turn providing dual  ...  The best approach is to use a password manager to store strong passwords for each application.  ... 
doi:10.5120/ijca2016910048 fatcat:wzv2o2crjzfuhiivu526h665zu

Anti Screenshot, Shoulder Surfing Resistant Virtual Keypad for Online Platform

2017 International Journal of Recent Trends in Engineering and Research  
In this paper, a secured virtual keyboard scheme that withstands such attacks is proposed.  ...  Today the prevalence of online banking is enormous. People prefer to accomplish their financial transactions through the online banking services offered by their banks.  ...  In this idea, the keys on a particular row keyboard before they are hidden.  ... 
doi:10.23883/ijrter.2017.3174.xzn7n fatcat:toapkayrw5brtgpxpczxsfcc4m

Forensically-Sound Analysis of Security Risks of Using Local Password Managers

Joshua Gray, Virginia N. L. Franqueira, Yijun Yu
2016 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)  
As a consequence, an attacker or a malware with access to the computer on which the password managers were running may be able to steal sensitive information, even though these password managers are meant  ...  Taking a systematic forensic analysis approach, this paper reports on a case study of three popular local password managers: KeePass (v2.28), Password Safe (v3.35.1) and RoboForm (v7.9.12).  ...  INTRODUCTION Passwords are essential for those with an online presence.  ... 
doi:10.1109/rew.2016.034 dblp:conf/re/GrayFY16 fatcat:hhnllkgnlne3zkijjxstcqi6ca

Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning [article]

Lei Zhang, Wei Bai, Shize Guo, Shiming Xia, Hongmei Li, Zhisong Pan
2020 arXiv   pre-print
By designing a simulated cyberspace experimental environment to verify our method. Our objective is to find more hidden attack paths, to analysis the weakness of cyberspace configuration.  ...  In particular, as we train over a greater number of agents as attackers, our method becomes better at rapidly finding attack paths for previously hidden paths, especially in multiple domain cyberspace.  ...  the management service of T2, that is T2 manager; Third, get the password FW2 password of firewall FW2 stored on T2 and the password S1 web password of service S1 web through T2 manager; Fourth, use T2  ... 
arXiv:2007.04614v1 fatcat:xvhpozaiejeqddbtqfhx4djdcq

Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers [chapter]

Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser
2015 Lecture Notes in Computer Science  
As a result, password managers are unnecessarily complex and yet they still occasionally fail to work properly on some websites.  ...  These semantic labels allow a software agent such as a password manager to extract meaning, such as which site the login form is for and what field in the form corresponds to the username.  ...  signed-in to their online accounts.  ... 
doi:10.1007/978-3-319-24192-0_4 fatcat:bslw6plqbzayzawldblze2co7e

Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?

Saeed Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi
2018 EAI Endorsed Transactions on Security and Safety  
The passwords were selected based on a survey of over 100 human password experts.  ...  The results revealed that participants exhibited four distinct behavioral patterns when the passwords were hidden, and many changed their behaviors significantly after the passwords were disclosed, suggesting  ...  She could not be listed as a co-author because the other co-authors lost contact with her since she left the University of Surrey.  ... 
doi:10.4108/eai.13-7-2018.162797 fatcat:fclxyryhzvfsrnwo6d5xycr2je

Kamouflage: Loss-Resistant Password Management [chapter]

Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh
2010 Lecture Notes in Computer Science  
An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry out a considerable amount of online work before obtaining any user credentials.  ...  We introduce Kamouflage: a new architecture for building theft-resistant password managers.  ...  Introduction All modern web browsers ship with a built-in password manager to help users manage the multitude of passwords needed for logging into online accounts.  ... 
doi:10.1007/978-3-642-15497-3_18 fatcat:nekiyufzljh75hxcfvrfpbrcma

Revisiting password rules: facilitating human management of passwords

Leah Zhang-Kennedy, Sonia Chiasson, Paul van Oorschot
2016 2016 APWG Symposium on Electronic Crime Research (eCrime)  
Recent work in computer security challenges the conventional wisdom of expert password advice, such as change your passwords often, do not reuse your passwords, or do not write your passwords down.  ...  Password rules were established in the context of past security concerns.  ...  Updated R6 -Keep-written-down-passwordshidden: Store written-down passwords or password hints in a secure place hidden from view.  ... 
doi:10.1109/ecrime.2016.7487945 dblp:conf/ecrime/Zhang-KennedyCO16 fatcat:7ikxxwlwx5cijjnc34gxkho46e

Secure authentication using dynamic virtual keyboard layout

M. Agarwal, M. Mehra, R. Pawar, D. Shah
2011 Proceedings of the International Conference & Workshop on Emerging Trends in Technology - ICWET '11  
All users who were told to spoof the Web-Based services, Business and Information Management. password could match only 33-67 per cent of the password Pages: 173 -  ...  A and password to the server for authentication.  ... 
doi:10.1145/1980022.1980087 dblp:conf/icwet/AgarwalMPS11 fatcat:x2zu6c72tjbnbjct67reyhprqy

How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse [chapter]

Yang Cheng, Zhao Qi
2014 IFIP Advances in Information and Communication Technology  
in detail, and thus designed a multidimensional password scheme that infused into the information dimensions and classified management.  ...  Based on the data of Internet password leak door at the end of 2011 as well as the college students' online survey, the paper analyzed the structural characteristics and reuse behavior of netizen passwords  ...  for classified management.  ... 
doi:10.1007/978-3-662-45526-5_25 fatcat:klxjxco4h5g7zc2s33dwagcbwy

Online Banking System using Mobile-OTP with QR-code

Amandeep Choudhary, Shweta Rajak, Akshata Shinde, Siddeshwar Warkhade, Prof. Ghodichor F.S.
2017 IJARCCE  
QR Code is versatile and is used in various fields such as online banking, managing attendance, help visually impaired people, security applications such as different kinds of cryptography and steganography  ...  However, the existing internet banking system was exposed to the danger of hacking method such as Phishing or Pharming beyond snatching a user"s ID and Password.  ...  To overcome from this problem we are implementing online banking transaction by using OTP which is hidden inside a QR code.  ... 
doi:10.17148/ijarcce.2017.64125 fatcat:4x4irhla4vh6bilecp2bhnjlfy

URL Analysis and Cross Site Scripting with Secured Authentication Protocol System in Financial Services

R Sujatha
2012 International Journal of Security Privacy and Trust Management  
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval  ...  ACKNOWLEDGEMENTS This paper is part of SSE Project funded through a National Technical Research Organization, New Delhi and is gratefully acknowledged.  ...  In this online user authentication process a malicious user cannot attain the end-user password from the network plane.  ... 
doi:10.5121/ijsptm.2012.1301 fatcat:6245nwpp75e6tj33l7tasfxecq

Protected Web Components: Hiding Sensitive Information in the Shadows

Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen
2015 IT Professional Magazine  
Protected Web components can keep private data safe from opportunistic attacks by hiding static data in the Document Object Model (DOM) and isolating sensitive interactive elements within a Web component  ...  For seven online password managers, gathered from the top 20 results for the Google query "free online password manager," we investigated whether they include scripts from a third-party on the page that  ...  Password managers. Online password managers are used to store the multitude of authentication credentials required on the modern Web.  ... 
doi:10.1109/mitp.2015.12 fatcat:zx7li3ilsvc7bgtkzbclx6hxqu
« Previous Showing results 1 — 15 out of 11,995 results