Prevention of Data Using Concept of HoneywordsJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 2)
Publication Date: 2018-02-28
Authors : Mumtaz Parveen; Ifra Khan; Sadia Patka;
Page : 120-123
Keywords : honeypot; honeywords; intruder; authentication; security; password;
Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.
Other Latest Articles
Last modified: 2018-03-07 15:15:37