Download presentation
Presentation is loading. Please wait.
Published byAlice Tabitha Nichols Modified over 9 years ago
2
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something I know”) Knowledge (“Something I know”) Password Pin Biometrics (“something I am”) Biometrics (“something I am”) Face Fingerprints Iris
3
Password Password is basically an encryption algorithms. It is 8-15 character or slightly more than that. Mostly textual passwords now a days are kept which are very simple.
4
BIOMETRICSBIOMETRICS
5
Biometrics Refer to a broad range of technologies. Automate the identification or verification of an individual.
6
Based on human characteristics or body organs
7
Process
8
% market share by type of biometric technology in 2003
10
PASSPHRASE Passphrase length is about 30-50 characters or more than that so it creates ambiguity to remember if there is no any proper sequence.
11
BIOMETRICS Biometrics has also some drawbacks. Suppose you select your fingerprint as a biometrics.. But what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….
12
3D PASSWORD
13
virtual environment The 3D password presents a virtual environment containing various virtual objects. The user walks through the environment and interacts with the objects. It is the combination and sequence of user interactions that occur in the 3D environment.
14
3D Virtual Environment 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. 3-D environment reflects the administration needs and the security requirements. 3D Virtual Environment
15
Advantages Flexibility Strength Ease to Memorize Respect of Privacy
16
A small virtual environment can be used in the following systems like- Atm Personal digital assistance Desktop computers & laptops Web authentication etc.
17
Attacks and Countermeasures Brute Force Attack Well studied Attack Shoulder-surfing Attack
18
QUERIES
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.