Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

INTRODUCTION OF

PASSWORD
Here is an overview of some of the different type of password
commonly used by people.
What is password ?
• A password which sometimes called a passcode is
secret data, typically a string of characters , usually
used to conform a user identity.
• Traditionally, passwords were expected to be
memorized, but the large number of password –
protected services that a typical individual accesses
can make memorization of unique passwords for
each service impractical.
• When the claimant is call the verifier. when the
claimant successfully demonstrates knowledge of
the password verifier through and established
authentication protocol, the verifier is able to infer
claimant’s identity.

2
 Common password

1. PIN
[ A personal identification numbers
mean pin. ]
About pin
• Pin is a numerical code used in many electronic
financial transactions like credit card, debit cards,
our mobile phone and bank account etc.
• The core purpose of pin is to provide and
additional layer of security to the electronic
transaction process.
• Pin usually range from 4 to 6 digits and are
generated by codding system that’s make pin
unique. 3
2. Alpha- numerical
• Alpha numerical characters are
combination of alphabetical and
numerical characters. More specifically
they are the collection of Latin letters and
Arabic digits.
• There are either 36 capital A - Z and 0 - 9
case insensitive or 62 A-Z and a-z and 0-9
case sensitive and also special characters
like dashes, dollar sign, underscore ,
parentheses are among the unusual
symbols included.
• It should be between 8-12 alpha
numerical and no space between them.
4
3. Pattern
• Graphical passwords, like the android pattern lock
are of popular security mechanism for mobile
devices.
• The mechanism was proposed as an alternative to
text-based passwords, since psychology studies
have recognized that the human brain have a
superior memory for remembering and recalling
visual information.

5
 Human body as a password
Human body passwords are called biometric technology which is a set of bio (human) and metric (techniques) used to
authenticate or verify identity of a person.

• New technologies grow rapidly and day by day


simplify things more , in order to make life easier
for people.
• Biometric technology is based on physical
characteristics of human that individual has in
common with another.
• Human body does not serve to use it as biometric
measure. It is necessary that if satisfactorily fulfills
the following characteristics.

6
1. Hand geometry
• Fingerprint authentication uses a person’s unique
fingerprint to verify for their identity.
• It can be used to secure everything from mobile
devices to automobiles, even buildings making it
the most widespread biometric authentication
technology.
• There are three types of fingerprints.
I. Optical scanner :- it takes a photo of the finger,
identifies the print pattern, and then compiles it
into an identification code.
II. Capacitive scanner :- a capacitive scanner works
by measuring electrical signals send from the
finger to the scanner.
III. Ultrasonic scanner :- will make their appearance
in the newest generation of smartphones.
Basically, these will emit ultrasounds that will
reflect back into the scanner. Similar to a
capacity one, it forms a map of the finger 7
unique to the individual.
2. facial recognition
This system use a person’s unique facial features to identify them. It used in a verity of places
such as smartphones, credit card payments and law enforcement.

• Facial recognition systems both


of them can be easily fooled with
makeup, masks or in some cases,
simply obstructing part of your
face.
• The classic way is to simply
extract your face’s features from
an image (eyes, nose, distance
between your lips and your nose
and etc.

8
3. Eye recognition
• Eye recognition uses the unique pattern of
someone’s iris and retina to identify them and iris
scan requires an infrared light sources , a camera
that can see IR and minimal light pollution in
order to ensure accuracy.
• It is generally used in situation where security is
most critical such as nuclear research facilities.
• It in the enrollment phase, the scanner will take a
photograph of your iris using both normal light
after the device records the person’s iris, it will
remove any unnecessary details, such as eye
lashes and then transform the information into
mathematical data and encrypt it.

9
4. Voice recognition
• Voice recognition technology analyzed a
person’s unique voice pattern to determine their
identity this technology can be use for
authentication over the phone or in person and
can work in both static and dynamic
environments.
• In order to identify the speaker, the specialized
software will break down their words into
packets of frequencies called formants. It uses
the tone, pitch.
• This is most commonly used biometric to
verify users when they contact a call center for
customer service support for example, online
banking.

10
5. DNA based
• DNA ( deoxyribonucleic acid ) is the most
reliable personal identification method.
• DNA is the structure that defines who we are
physically and intellectually, it is not possible
that any other human being will have the same
set of genes.
• DNA biometric is not an infallible method of
identification.
• Code can be attracted this does not apply to
identical twins.

11
 Thesetechniquesarealso
availablebuthavenotbeenas
widelyadoptedlike:-

• Palm vein identification


• Brain waves
• Walk styles
• DNA
• Heartbeat
• Iris scan

12
 Advantages and disadvantages

Advantages Disadvantages
• Finger print or iris scan is much easier to use than • You can not revoke the fingerprint, iris, voice remotely.
passwords, especially.
• A big disadvantages of biometric security is that a user
• it only takes a second for the most modern smartphones can not remotely alter them.
to recognize fingerprint allow to access the phone.
• If you lose access to an e-mail, you can always initiate a
• Ultra sound scanner will soon become common place, remote recovery to help you regain and control.
scenes, manufacturers can place them directly behind
• Since then, pages have come for vulnerabilities, but bug
the screen, without taking any extra real estate on a
hunters are constantly on the hunt for new once.
phone.
 Hacking
HOW HACKERS STEAL THE WAY TO PROTECT THE
PASSWORD PASSWORD
• There are six popular methods of • Here are some way to protect your
password theft : password.
1. Guessing 1. For be safe from guessing never –
ever use a common ,weak
2. Automated attacks
password like”password123”.
3. Phishing
2. To protect your self again s
4. Malware automated password attacks make
your password at least 12
5. Physical spying and theft characters long and mixed
6. Data breaches characters for example” mom
baked 500 cookies”
3. To protect your self from phishing
when you are on any link or
website make sure that you are
going at actual site claimed as an
example, ”amazon ”.
14
Thank You

15

You might also like