Credential Proactive Protection Guard: A Proactive Password Checking Tool
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 12
Abstract
Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that user choose password from his/her profile unintentionally which create serious problem. The password has been taken from small domain which enables hackers to crack credentials by trying different fields of the user profile. To overcome this problem, proactive password checker is required which enforces password policies and prevents users from choosing easily guessable passwords. In this paper, we have introduced proactive password checking tool (Credential Proactive Protection Guard) based on user profiling which automatically check whether the given credential is safe or not and find the relationship between user profile and credentials. The focus of the current study is to check the level of association between different fields of user profile with credentials. The detailed technique, mechanism and tool of the proposed proactive password checker is also discussed in detail.
Authors and Affiliations
MONIKA PATHAK , SUKHDEV SINGH
PERIODICITY DETECTION ALGORITHMS IN TIME SERIES DATABASES-A SURVEY
Periodicity mining is used for predicting different applications such as prediction,forcasting etc.It has several application in Timeseries databases.Several algorithms are present for detecting the periodicity.But most...
Design and Realization of Digital FIR Filter using Dolph-Chebysheb Window
In Digital Signal Processing, one of the most important filter type is the FIR filter which can be designed via various methods. Window technique is the most important technique that is used to design the FIR filter. Apa...
A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and serve...
Various Aspects of Minutia As a Fingerprint Feature
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerpr...
A Novel Approach to Big Data Management
In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. The increase in the amount of data sources also increases the amount of the data acquired. The...