Prevention of Data Using Concept of Honeywords
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 2)Publication Date: 2018-02-28
Authors : Mumtaz Parveen; Ifra Khan; Sadia Patka;
Page : 120-123
Keywords : honeypot; honeywords; intruder; authentication; security; password;
Abstract
Data Security plays a pivotal and decisive role in current times. Passwords could be authenticated easily using brute forces. Various other technologies used such as an OTP or code generators require third hand devices. Users authentic password are amalgamated with honeywords and stored as sweet words in an encrypted file within the database. These sweet words even after getting in the hands of an invader bewail him. The proffered system has an additional security authentication i.e. the key validity stage. The intruder when enters password with conjecture then after three attempts he will be directed towards a page showing decoy files and at the same time an alert will be send to the genuine user notifying him about the infringement.
Other Latest Articles
- VIOLENCE AGAINST TEACHERS: SPEECHES FROM BRAZILIAN’S DIGITAL MEDIA
- THE RELATIONSHIPS BETWEEN THE TRADITIONAL BELIEFS AND PRACTICE OF MATHEMATICS TEACHERS AND THEIR STUDENTS’ ACHIEVEMENTS IN DOING MATHEMATICS TASKS
- THE LEGITIMACY OF PHYSICAL EDUCATION CLASSES FOR UNIVERSITY STUDENTS
- STUDENTS’ CONFIDENCE IN THEIR FINANCIAL MANAGEMENT ABILITIES: THE ROLE OF SOCIO-DEMOGRAPHIC CHARACTERISTICS AND EDUCATION
- THE ROLE OF PARENTAL INFLUENCES ON THE ECONOMIC SOCIALIZATION OF CHILDREN
Last modified: 2018-03-07 15:15:37