Presentation is loading. Please wait.

Presentation is loading. Please wait.

Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.

Similar presentations


Presentation on theme: "Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something."— Presentation transcript:

1

2 Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something I know”) Knowledge (“Something I know”) Password Pin Biometrics (“something I am”) Biometrics (“something I am”) Face Fingerprints Iris

3 Password Password is basically an encryption algorithms. It is 8-15 character or slightly more than that. Mostly textual passwords now a days are kept which are very simple.

4 BIOMETRICSBIOMETRICS

5 Biometrics Refer to a broad range of technologies. Automate the identification or verification of an individual.

6 Based on human characteristics or body organs

7 Process

8 % market share by type of biometric technology in 2003

9

10 PASSPHRASE Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.

11 BIOMETRICS Biometrics has also some drawbacks.  Suppose you select your fingerprint as a biometrics..  But what to do when you have crack or wound in your finger.  And now a days some hackers even implement exact copy of your biometrics also….

12 3D PASSWORD

13 virtual environment The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.

14 3D Virtual Environment 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment

15 Advantages  Flexibility  Strength  Ease to Memorize  Respect of Privacy

16 A small virtual environment can be used in the following systems like-  Atm  Personal digital assistance  Desktop computers & laptops  Web authentication etc.

17 Attacks and Countermeasures  Brute Force Attack  Well studied Attack  Shoulder-surfing Attack

18 QUERIES

19


Download ppt "Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something."

Similar presentations


Ads by Google