Tuesday, May 5, 2020

Signal Processing and Computing Technologies †MyAssignmenthelp.com

Question: Discuss about the Signal Processing and Computing Technologies. Answer: Introduction: The increased use of different online services has presented a need to improve a secure system. The system be designed in such a way that it would be able to authenticate and validate the authorized user. In the recent times, several schemes of user authentication have been developed. Various methods of authentication such as token based, biometric based and knowledge based have been developed. The text-based system of passwords has been the major method of security medium over the years. Although the text based system of verification has been the base of authentication for several years, yet it has faced some drawbacks in the present times. The report discusses on the various attacks that are attempted to crack the systems. There are several attacks on the text based password method and graphical password techniques. The different kinds of attacks that are faced are brute force attack, dictionary attacks, guessing, spyware attacks, social engineering and shoulder surfing. The report provides a brief insight on these various kinds of attacks and the way in which they are imposed. This report focusses on a latest technique of the authentication of the user, which would be based on using a numeric scheme of One Time Password (OTP). This new method of authentication has been widely adopted by the government sector, banks and corporate sector based virtual private networks (VPNs) so as to diminish the effects of the compromise of the password. It also discusses a proposed algorithm model, which could be used in order to implement the newer technique of this user authentication scheme management. Advantages and Disadvantages of One Time Password Scheme This paper focusses on the new technique for authentication of a user, which may be implemented in the new IT systems. The research paper discusses about the various previously used methods of the authentication of the user This paper discusses about the various possible attacks that could be imposed on text based password schemes and techniques of graphical passwords. The paper also focusses on the newest technique of verification and also provides an insight of a proposed algorithm of one time password based scheme. The disadvantages of this research paper are: The research paper has lacked to describe the various possibilities of attacks that could be imposed by attackers on OTP based schemes. This paper also lacks the various mitigation strategies, which should be applied on OTP based schemes in order to avoid such vulnerable attacks on the system of the users. The paper discusses about the various tolerable attacks on text based systems but it fails to describe about their various mitigation schemes. Based on the different sections of the research paper, it can be concluded that the new feature of one time password scheme would be a great step towards the authentication of the users who would use any IT systems. The feature described in the research paper would be able to authenticate the user and thus provide a better insight for the betterment of the security technologies. Bibliography Gurav, S.M., Gawade, L.S., Rane, P.K. and Khochare, N.R., 2014, January. Graphical password authentication: Cloud securing scheme. InElectronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on(pp. 479-483). IEEE. Huang, Y., Huang, Z., Zhao, H. and Lai, X., 2013. A new one-time password method.IERI Procedia,4, pp.32-37. Ma, Y., Feng, J., Kumin, L. and Lazar, J., 2013. Investigating user behavior for authentication methods: a comparison between individuals with down syndrome and neurotypical users.ACM Transactions on Accessible Computing (TACCESS),4(4), p.15. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D., 2013. Cloud authentication based on anonymous one-time password. InUbiquitous Information Technologies and Applications(pp. 423-431). Springer, Dordrecht.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.