Enhancing Security by CAPTCHA based Image Grid Master Password
|
|
|
- Arline Brooks
- 10 years ago
- Views:
Transcription
1 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin*, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin *College of Information Science and Technology, Department of Computer Science, Peter Kiewit Institute, University of Nebraska at Omaha, 1110 South 67th Street Omaha, Nebraska , United States Jaypee University of Information Technology, Waknaghat, Solan , Himachal Pradesh, India s: {aditya187,amanpreetsarora, radhikamedury, shubh.naval, juitrajat, doi: /ijact.vol2. issue5.10 Abstract Identity theft, privacy invasion, loss of key information is the major reasons for which security is breached these days. Hence, it is very essential that effective security prevention measures are taken. This paper, proposes many such hacking prevention measures with approaches to recover a hacked account. It also puts forward a novel CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) based mechanism, which can protect the crucial information even if the account is hacked. Keywords: CAPTCHA, Security, Image Grid Algorithm, Grid Generation Algorithm 1. Introduction and Motivation In this day and age, s are one the most extensively used modes of communication. People access s for personal and professional uses. In both the cases there is vital information that is being sent and received. With the advent of e-commerce, there is also a risk of losing money by fraud. account can be hacked by various means. Most widely used techniques are Keylogger software and a phishing page. Keylogger software pursues keys struck on a keyboard typically in a stealthy manner so that the person using the keyboard remains unaware that his actions are being monitored. Password is guessed by analyzing the recorded key strokes. It is mostly used on a public computer. Whereas a phishing page is a fake page looking like a website s login page. A user is allured to enter his username and password. Once the details are entered they are sent directly to the hacker. Hence, it is very necessary to take proper measures to make communication as secure as possible. We put forward the concept of an easy to remember image based Master Password, which will be used to generate a collage CAPTCHA thus making it safe from automated bots and humans. This master password is actually an image uploaded by the user, which will be presented as a collage CAPTCHA whenever required. A user will have to select his particular uploaded image i.e. the master password from the set of given images. If a wrong guess is made, the collage is generated again with changed image positions. There is a limit to maximum number of wrong attempts. Growing number of accounts being hacked and absence of any sound mechanism to recover the hacked account motivated us to look for alternative ways. Hence, we propose a few suggestions and the master password mechanism to existing Service Providers. To make it effortless for the user to memorize the password, we make use of an image as the master password. The rest of the paper is organized as follows: Section 3 and 4 provides suggestions and suggested methods and Section 5 and 6 provides Image Mining and Image Grid algorithms followed by Grid Generation Algorithm explained in Section 7 and supported by user survey explained in Section 8 followed by Conclusion and References
2 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin Figure 1. Initial password recovery form in Gmail. It asks for various problems and leads the user accordingly. 2. Literature Survey Figure 2. Password recovery form in Windows Hotmail. A study of various research papers was done on CAPTCHAs [1-12], security, computer networks, image mining and image segmentation. Starting with the papers and study material on computer networks and security, a study of latest security mechanisms employed by major service providers (ESPs) was done. We also logged onto major services like Yahoo, Gmail and MSN. Various loopholes were found in their password recovery systems. Presented below (Figure 1-6) are the screenshots of Gmail, Hotmail and Yahoo Mail; these were studied as part of the literature survey to discover the ubiquitous but overlooked flaws in the existing system. A case study has been done to recover a lost password on Yahoo Mail. Few flaws were found in the existing system and to overcome these flaws finally the Master Password Mechanism is suggested by us. Beginning with Figure 3, it shows the Yahoo page when the user clicks on the Forgot My Password/ID/Cannot Login link. This figure demonstrates the various ways in which to begin the password recovery process. Next to follow is Figure 4, wherein the user is asked to enter the secondary address. This part of the password recovery process has a flaw that in case the hacker changes the secondary address of the user, will not be able to retrieve his password. Figure 5 follows with security question. Here also the same problem (as discussed with previous figure) might occur that the hacker may change user s security question as well. If in case user enters the information asked in Figure 4 and Figure 5 correctly then password can finally be renewed as shown in Figure
3 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Figure 3. Initial password recovery form in Yahoo. It asks for various problems and leads the user accordingly. Figure 4. An alternative address is asked for password recovery. This step is not useful in case user s secondary ID is changed by the hacker. Figure 5. A security question is asked for password recovery. This step is not useful in case user s security question is changed by the hacker or the user forgets the answers
4 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin Figure 6. The final step where the password is changed. Subsequently, we have studied about CAPTCHAs in which a reverse Turing test is used to thwart the automated bot attacks to crack the passwords. CAPTCHA is basically a type of challengeresponse test used in computing to ensure that the response is not generated by a computer [11]. The most common form of CAPTCHAs are randomly generated images containing codes that are to be manually entered. A machine cannot decode the intentionally distorted letters and numbers. Also we have suggested a CAPTCHA based master password. To create the Master Password, we have used image mining and image segmentation algorithms. Image mining, a broader view of data mining technique can help us find meaningful relationship among various images generated by the image mining algorithm [2]. It is more than just an extension of data mining to image domain as it requires expertise in computer vision, image processing, image retrieval, data-mining, machine learning, database, and artificial intelligence for perfect retrieval. Image mining is rapidly gaining attention among researchers in the field of data mining, information retrieval and multimedia databases because of its potential in discovering useful image patterns that may push the various research fields to new frontiers. According to the image mining technique given in the research paper, various image descriptors/region descriptors can be assigned to an individual image after successfully mining through Figure 7. A screenshot taken from showing the record of last 5 IP addresses from where the account was last accessed. It also shows the time details
5 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Figure 8. This figure explains the proposed way in which Master Password could be implemented. Here Master Password is used to open a locked folder. the segmentation algorithm. These region descriptors are very useful in finding different types of images from a large database [4]. A way of image mining is to rely on the automatic/semi-automatic analysis of image content and to do the mining on the generated descriptors. For example, color, texture, shape and size can be determined automatically. Objects in an image can be determined by the similarity of those attributes. After getting a collection of images from image mining algorithm, the task to be done is to choose the relevant images that are necessary for that particular application. This is known as the Refinement Process. It uses the concept of Association Rule Mining technique of databases. For example, the support and confidence parameters can be used here for getting the relevant images. The image form of password is easy to remember than the usual textual passwords. Images also have more scope than text in real world entity as it is said that A picture is worth a thousand words, therefore, mining images for the purpose of having different combinations of master password would definitely increase the complexity of cracking the password and therefore, fulfilling the aim of the research paper. 3. Suggestions for Service Providers 3.1. Safety Measure Prior to Account being Hacked Service Providers (ESPs) maintain a record of the IP address accessing the account. It can be done at the time of creation of the account that user is asked a question (given below) From where do you access this account? 1. Home/Office 2. Public Place (Internet Cafe) 3. Both If the answer to the above question is a i.e. the account is used from home/office then there must be a fixed IP address of these places provided to user by the ISPs (Internet Service Providers). Hence those particular IP addresses are recorded in the database. In case the account is being opened consistently from a new IP address then the user is alerted by a message and is authenticated by answering a security question or entering the master password. If the answer to the above question is b then user is not warned at all even if many different IP addresses are accessing the account. He s advised to uncheck the stay signed in checkbox while logging in and logout from the account when done. Timed auto logout feature can also be used in
6 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin which user is automatically logged out from the session after a certain amount of time. If the answer selected is c i.e. both, then also the procedure as explained in option b shall be followed. Another safety measure could be to lock the folders/labels prevalent today in most of the services. Locking shall be done by the master password How to Retrieve an Account after it is Hacked? There are following existing ways to recover a hacked account: 1. Secondary ID: An having the information about how to reset your password is sent to user s secondary id. 2. Security Question: User can answer the security questions filled by him while creating the account in order to retrieve his password. Mobile Phone: User s new password is sent as an SMS to the mobile number mentioned in user s account. 3. However, all the above three details can be changed by the hacker; hence user cannot recover his account by merely adhering to above-mentioned ways. 4. Proposed Mechanism 4.1. Understanding a CAPTCHA A CAPTCHA [7,11] is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. It is imperative these days to thwart any brute force attack launched by automated bots to prevent account. We have clubbed a CAPTCHA along with a password known as Master Password. This Master Password is actually an image uploaded by the user. With the help of 2 algorithms we create a collage CAPTCHA, containing the master password. A user will be presented this CAPTCHA to recover a hacked account, to reset password or to view the contents of any locked folder
7 International Journal of Advancements in Computing Technology Volume 2, Number 5, December Our suggested method uses an Image-Mining algorithm along with a Image Grid Algorithm. Here s the whole process in short is explained: 2. User uploads any 1 personal picture, specially of any object/pet. This image is the Master Password. 3. Image Mining Algorithm looks for similar (not exact) images and generates a pool of images. 4. Image Grid Algorithm makes a collage of these images. It will be a grid of say, 4 x 4 images consisting of 1 actual image uploaded by the user and 15 similar images from the image pool, which is generated by the Image mining algorithm. 5. This grid of images (Collage CAPTCHA) will be used to ask for the Master Password whenever it is required. 6. Master Password can be used to lock the folders or to recover a lost account. 5. Image Mining Algorithm 5.1. Segmentation Image segmentation is an initial and vital step in a series of processes aimed at overall image understanding. The image is segmented into various regions. The purpose of segmentation is to partition an image into meaningful regions with respect to a particular application. Here we segment images into regions identifiable by region descriptors. The segmentation is based on measurements taken from the image and might be greylevel, color, texture, depth or motion Searching Images based on various Region Descriptors According to the varied regions of the above mentioned image, we tend to find the related object images which are similar to it. Compare objects in one image to objects in every other image. In this algorithm we propose to find the images which are having the same objects as that of our segmented image Refining the Search Operation Based on the main region descriptor, we tend to make our search more specific by eliminating all the images found so far that are not associated with it with the help of some associations rule in data mining. Explanation of flowchart- The first step is to select an image for segmentation. The image which is uploaded as a master password is used as the input to the segmentation algorithm. Here we have uploaded a cat image as the master password (Refer Figure 9: highlighted using red box). This image is used for segmentation. Now, we segment the image into various region descriptors i.e R1,R2.Rn where Ri is the ith region descriptor. Let us assume that the cat s face is described by resgion descriptor R2 (main region descriptor) and other portions of image like background and cat s remaining body by R1 and R3 respectively. Now, we search for the different type of images based on these region descriptors from a centralized database having collection of different types of images. This would result with a collection of different types of images. Now, based on our main region descriptor i.e R2 (cat s face), we further refine our search by the help of association rule data mining technique to obtain different cat images. Here, we have assumed that after refinement is over, we will be getting around 16 images that are relevant to the main image (Master Password). Now, These images are used as the input to the Grid making algorithm [2]. 6. Image Grid Algorithm
8 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin 1. Set a Static Image Grid: We intend to create a grid of images, say of 6 images out of the images collected using the image mining algorithm previously explained. These images need to be cropped to a maximum height and width of 500 pixels, say. 2. Leave Margins so as to wrap the Images Nicely: Place a bit of margin on the right and bottom edges to add a bit of whitespace. 3. Align the Photographs: Image grids look best when the photographs are both vertically and horizontally centered. 4. Adding the Slider: To set up the slider, by adding some JavaScript. 7. Grid Generation Algorithm var i, j, counter=0; var a[4][4]; //selecting 16 random images from the set of 5000 images for(i=0; i<4;i++) { for(j=0; j<4;j++) a[i][j] = rand(0,4999); } im = rand(0,15); $_SESSION['mpwd'] = md5($im); //Code for generating the image grid var counter = 0; for(i=0; i<4;i++) { for(j=0;j<4;j++) { if(counter = = im) { //display the master password image of the user stored by him at the time of registration counter++; } else { //display the random images previously determined counter++; } } } The algorithm was implemented using PHP. It makes use of mt_rand() function to extract random images from a pool of 5000 images which were previously generated by the image mining algorithm. Here, randomly 16 images are selected which constitute the image grid. User s master password is also assigned a random location and is encrypted by md5() hashing algorithm. This encrypted location of user s password is stored in a session variable which is later used to check the correct answer
9 International Journal of Advancements in Computing Technology Volume 2, Number 5, December 2010 Figure 9. A sample 4 x 4 collage. It is formed from the image pool generated by the master password image of the user. 2 Algorithms were used. Each time the page is a refreshed image changes their position. 8. User Survey A user survey was conducted to test the ease and feasibility of this technique. The technique was implemented using PHP and was hosted over intranet on our webpage. A test pool of 1000 images was created to randomly generate the image grid. On every page refresh set of 16 new images was displayed out of which 1 was user s own master password image. Selected users were sent invitations to participate in the survey. The registered users chose the right answer with 90% accuracy in first attempt and with 95% accuracy in second attempt. Along with this a poll was posted over the webpage, in which around 83% of the users found this better than the text based CAPTCHAs. Also, a certain set of users were asked to crack the password without knowing the answer to check for the security of the technique. On an average, 89% of the people could not guess the answer. They tried refreshing the page and look for a common image to guess the answer but few images repeated themselves, thus making the guess work difficult. To further improve the efficiency of this method, a larger grid could be deployed. 9. Conclusion security can be enhanced by following the suggestions mentioned in the paper. Clubbing of CAPTCHA with password saves time and effort, increases the ease of use and is decently effective in thwarting both human intrusion and bot attacks. If the proposed mechanism is incorporated by existing service providers then security would be greatly enhanced. This will also build a confidence in novice users, business professionals and administrators who store key information in their accounts. Hence, an efficient way to protect and recover hacked account is put forth. Future holds great possibilities only if cyber crime is checked by augmenting internet security. 10. References [1] R. Gossweiler, M. Kamvar and S. Baluja, What s Up CAPTCHA? A CAPTCHA Based on Image Orientation, In Proceedings of the 18th international conference on WWW, pp , [2] C. Ordonez and E. Omiecinski, Image Mining: A New Approach for Data Mining, Georgia Institute of Technology, CC Technical Report; GIT-CC-98-12, pp.1-22,
10 Enhancing Security by CAPTCHA based Image Grid Master Password Nitin, Amanpreet Singh Arora, Aditya Patel, Radhika Medury, Shubhrangshu Naval, Rajat Gupta and Srishti Sarin [3] W. Hsu, M.L. Lee and J. Zhang, Image Mining: Trends and Developments, Journal of Intelligent Information Systems 19(1), pp. 7-23, [4] P. Stanchev, Using Image Mining for Image Retrieval, In Proceedings of the IASTED conference on Computer Science and Technology, pp , [5] S. Yardi, N. Feamster and A. Bruckman, Photo-Based Authentication Using Social Networks, In Proceedings of the 1st Workshop on Online Social Networks, pp.55-60, 2008 [6] Y. Rui and Z. Liu, Excuse Me, But Are You Human?,In Proceedings of the 11th ACM International Conference on Multimedia, pp , [7] L. Ahn, M. Blum, N.J. Hopper, and J. Langford, CAPTCHA: Telling humans and computers apart, In Advances in Cryptology: Lecture Notes in Computer Science, pp , [8] R. Agrawal, T. Imielinski, and A. Swami, Mining Association Rules between Sets of Items in Large Databases, In Proceedings of the ACM SIGMOD International Conference on Management of Data, pp , [9] S. Belongie, C. Carson, H. Greenspan, and J. Malik, Recognition of Images in Large Databases using a Learning Framework, Technical Report TR , U.C. Berkeley, CS Division, pp. 1-8, [10] L. Ahn, M. Blum, N.J. Hopper and J. Langford, CAPTCHA: Using Hard AI Problems for Security, Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, pp. 294, [11] L. Ahn, M. Blum and J. Langford, Telling Humans and Computer Apart Automatically, Communications of ACM 47, pp , [12] S. Li and H.Y. Shum, Secure Human-Computer Identification (Interface) Systems against Peeping Attacks (SecHCI): A Survey, Technical Report, pp.1-53,
SECURING SELF-SERVICE PASSWORD RESET
SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
How do I enroll in the password portal?
The self-serve portal is designed to allow you to change your password and unlock your locked account even if you have forgotten your password. You must enroll for this service to be able to use it. You
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Security Information Management System
Commonwealth of Kentucky Security Information Management System User Guide Release 1.8 February 2016 DISCLAIMER: The Commonwealth is in process of securing a service to allow use of mobile phone numbers
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
OKPAY guides. Security Guide
Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Your Blueprint websites Content Management System (CMS).
Your Blueprint websites Content Management System (CMS). Your Blueprint website comes with its own content management system (CMS) so that you can make your site your own. It is simple to use and allows
Comparative Analysis of CAPTCHA Based Techniques : A Review
79 Comparative Analysis of Based Techniques : A Review Jaswinderkaur Department of Computer Engineering Punjabi University, Patiala [email protected] Lal Chand Panwar Department of Computer
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Password Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
How Board Members and State Employees Utilize the Security Portal to Access PDMP. July 30, 2014 Version 2 Software Release Version 3.4.
How Board Members and State Employees Utilize the Security Portal to Access PDMP July 30, 2014 Version 2 Software Release Version 3.4.11 Table of Contents How to Access PDMP via the ADPH Security Portal...
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
Frequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
Netigate User Guide. Setup... 2. Introduction... 5. Questions... 6. Text box... 7. Text area... 9. Radio buttons...10. Radio buttons Weighted...
Netigate User Guide Setup... 2 Introduction... 5 Questions... 6 Text box... 7 Text area... 9 Radio buttons...10 Radio buttons Weighted...12 Check box...13 Drop-down...15 Matrix...17 Matrix Weighted...18
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.
Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages
MJPEG Camera Client User Manual
MJPEG Camera Client User Manual CONTENTS User Manual 1 WELCOME... 3 1.1Features... 3 1.2Installation Requirements... 3 1.3 Software Installation... 3 2 Software Operation... 5 2.1 Tab bar... 6 2.2 Device
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Distributor Control Center Private Label/Channel Administrators
March 13, 2014 Distributor Control Center Private Label/Channel Administrators Version 2.6.3 Everyone.net Table of Contents Distributor Control Center... 1 1 The Distributor Control Center... 4 1.1 Introduction...
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns
RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath
Multi-factor Authentication Security Enhancement
Multi-factor Authentication Security Enhancement Contents Overview of Multi-Factor Authentication... 4 Establishing a First Mercantile Multi-Factor User Account... 5 Authentication Questionnaire... 8 Secondary
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Encrypted Email Users Guide. Revised 6/8/2015
Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading
Penetration Testing: Lessons from the Field
Penetration Testing: Lessons from the Field CORE SECURITY TECHNOLOGIES SCS SERVICES May 2009 1 Agenda: About me: Alberto Soliño Director of Security Consulting Services at Core Security One of first five
1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?
Troubleshooting and Frequently Asked Questions FollowMyHealth Patient Portal 1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?
EUROPEAN COMMISSION Directorate-General for Education and Culture
EUROPEAN COMMISSION Directorate-General for Education and Culture Lifelong Learning: policies and programme Coordination of the "Lifelong learning" programme ECAS User Manual The European Commission Authentication
Welcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
Setting up a Personal Email Account
Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date
User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date: July 22, 2015 TABLE OF CONTENTS Page TRUST SAFETY ACCOUNTING UPLOAD USER GUIDE... 2 BACKGROUND... 2 HOW TO USE THE
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account
EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Securemail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
Topic: ACE Initial Account Access
What s Inside: Account Creation Automatic e-mail Page 1 Password Retrieval Page 2 Initial Login Page 3 Creating New Password Page 4 Changing Password Page 6 Login Failure Page 6 Additional ACE Resources
Frequently Asked Questions
Barclaycard Spend Management Frequently Asked Questions Access/Login 1. Is the user name case-sensitive? The user name is not case-sensitive. It must be a minimum of 6 characters and up to 100 characters.
PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms
PhoneCrypt Desktop Phone Encryption Software PhoneCrypt Manual Mobile phone encryption for Windows Platforms Introduction Contents http:// www. securstar.com [email protected] 2009 by SecurStar GmbH,
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
User Guide. Active Online Backup - Secure, automatic protection
Active Online Backup - Secure, automatic protection 1. Quick Setup... 1 2. Backup Selecting Folders and Files... 2 3. Backup - Changing Selected Folders and Files... 3 4. Checking on Your Backups... 4
Vico Licensing Management System User Guide
Vico Licensing Management System User Guide Table of Contents Introduction to Vico Licensing Management System... 3 Login and Password... 3 Account Details Page... 4 Vico Contact Tab... 5 Account Details
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Zipit Chat. Functional Specification / User Manual
Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
TMD Friction IT Helpdesk
TMD Friction IT Helpdesk USER MANUAL TMD Friction UK, MIS Department Published: Monday, 09 January 2012 2:30 PM Contents Our global helpdesk Creating your new account My home screen My Profile I need help
Maryland MESA Database School Coordinators Login and Registration Training Handout
Maryland MESA Database School Coordinators Login and Registration Training Handout The following information will assist users in creating a user profile in the database, managing student profiles for
What s the difference between my Home Banking password and my Enhanced Login Security?
Common Questions about Enhanced Login Security 818-973-4900 or 800-973 - 4989 Mon. - Fri. 8:30 a.m. - 4:00 p.m. Enhanced Login Security is a new online security feature that will provide you additional
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Creating an e mail list in YahooGroups
Creating an e mail list in YahooGroups Creating an e mail list in Yahoo Groups is easy to do. Just follow the steps below and your group will be created in a matter of minutes. Why use Yahoo Groups? First,
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Secure E-mail. Using Cisco Secure E-mail Server
Secure E-mail Using Cisco Secure E-mail Server Background The UnitedHealthcare secure e-mail system is offered through Cisco Secure Server and is used to securely exchange information with providers. This
Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website
Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website Office of Disability Adjudication and Review October 2011 Representative Guide for Electronic Records
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
The anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to [email protected] (March2010) I. What this document is about II. Introduction III. The anatomy of an
Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
Multi-Factor Authentication
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
Managing your e-mail accounts
Managing your e-mail accounts Introduction While at Rice University, you will receive an e-mail account that will be used for most of your on-campus correspondence. Other tutorials will tell you how to
Preparing your Domain to transfer from Go Daddy
Preparing your Domain to transfer from Go Daddy Before you can transfer a domain: Getting Started Disable domain privacy. If the privacy service forwards incoming email, check the ʻforward toʼ contact
How To Create A Digital Signature And Sign A Document With Adobe Reader XI
How To Create A Digital Signature And Sign A Document With Adobe Reader XI jhigbee 12/05/2012 How To Create A Digital Signature In Adobe Reader XI (1) Open Acrobat Reader XI and navigate to the Preferences
FORWARDING EMAIL (directed to a non-gcccd email account) Revised 3/22/13
FORWARDING EMAIL (directed to a non-gcccd email account) Revised 3/22/13 FORWARDING FROM OUTLOOK WEB ACCESS (easiest method) You can setup your email to auto forward to a non-gcccd account such as Yahoo,
Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC
Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
How to Apply for Employment Opportunities
How to Apply for Employment Opportunities Viewing job postings Visit www.stcatharines.ca and click on the Employment Opportunities button. Our Careers page will then be displayed. On the Careers page there
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
Secure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping.
Securing Web Application from SQL Injection & Session Tracking 1 Pranjali Gondane, 2 Dinesh. S. Gawande, 3 R. D. Wagh, 4 S.B. Lanjewar, 5 S. Ugale 1 Lecturer, Department Computer Science & Engineering,
Password Depot for ios
Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
