Credential Proactive Protection Guard: A Proactive Password Checking Tool
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 12
Abstract
Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that user choose password from his/her profile unintentionally which create serious problem. The password has been taken from small domain which enables hackers to crack credentials by trying different fields of the user profile. To overcome this problem, proactive password checker is required which enforces password policies and prevents users from choosing easily guessable passwords. In this paper, we have introduced proactive password checking tool (Credential Proactive Protection Guard) based on user profiling which automatically check whether the given credential is safe or not and find the relationship between user profile and credentials. The focus of the current study is to check the level of association between different fields of user profile with credentials. The detailed technique, mechanism and tool of the proposed proactive password checker is also discussed in detail.
Authors and Affiliations
MONIKA PATHAK , SUKHDEV SINGH
Web Banking: A Security Management and Communications Approach
The paper provides a survey research report on the information security and communication management disciplines within the scope of Web Banking. The benefits and uses of information and communication approaches were exa...
A novel high-speed image processing technique for detecting edges using abs- Laplacian kernel
Delineating patterns that are alike or in other words, detecting edges that separates them is the most critical step in image processing. There are various methods available e.g Sobel, Prewitt, Canny based edge detection...
An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks
Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issue...
A Review of Image Contrast Enhancement Techniques
Images are an important part of today’s life. Images are captured through many devices such as cameras, mobile phones, scanners etc. The quality of images is degraded due to many reasons. The reasons may include adverse...
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center
The main aspect of any cloud application is to provide simultaneous access to number of users by reducing the cost of maintenance. This is mainly achieved by the process of implementing virtualization effectively. Virtua...