ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Building Model for Enhancing Information Systems Security

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.13, No. 2)

Publication Date:

Authors : ; ; ;

Page : 72-81

Keywords : Information Systems; Information systems security; authentication; passwords; symmetric encryption; brute force cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Today, electronic systems and information have become no less important than food and water for human life. No one can deny this fact. Electronic information systems contribute to the development of life in many areas. But some electronic information systems should not be available for anyone to use, such as reading, operating, modifying or destroying without permission. This type of electronic information systems must be protected in some way based on the related situation. . Password-based authentication is the first defense for most information systems. Password security enhances the security of the entire information system. Therefore, password protection models become very important in such cases to help users improve authentication security. Researchers published various methods based on salting, hashing, symmetric encryption, and key splitting methods. The paper conducted by Saleh Al-Asali describes a method for generating a suitable secret key that is easy to memorize and remember, as he succeeded in generating a password that is strong and easy to remember. This paper improves the previous method by adding some improvements mentioned in the section described in the suggested method.

Last modified: 2024-03-04 18:37:01