Synopsis
Synopsis
Project Synopsis
Group ID:
Project Title: ________Personal Password Management System
__________________________________________________
Group Members:
Abstract:
Another problem with password managers is that they can be hard to use,
which stops some people from adopting them. Silver et al. (2014) found
that people may abandon password managers if they’re complicated, so
simple designs are important. Chiasson and others (2015) also looked at
this balance between security and ease of use. They found that while
strong security is crucial, a difficult interface can make users avoid using
the tool properly. Wagner et al. (2018) explored how password managers
interact with web browsers and discovered vulnerabilities that could lead
to security gaps. This shows that to make password managers truly
effective, they need to be both secure and easy to use.
Conclusion:
This project successfully addresses the need for a secure and user-friendly
solution for managing passwords by developing a personal password manager
using Python. By implementing encryption for password storage and providing a
graphical user interface, the system ensures both security and ease of use. This
solution mitigates the risk of unauthorized access to stored passwords, making it
a practical tool for users who want to protect their credentials from data theft or
misuse. The project demonstrates the feasibility of building a reliable password
management system with minimal resources, offering enhanced security features
beyond standard browser-based password storage.
References:
1] F. Jia and L. Z. Kong, “Intrusion Detection Algorithm Based on Convolutional Neural
Network,” "Beijing Ligong Daxue Xuebao/Transaction Beijing Inst. Technol., vol. 37, no.
12, pp. 1271–1275, 2017, doi: 10.15918/j.tbit1001-0645.2017".12.011.
[2] L. Mohammadpour, T. C. Ling, C. S. Liew, and C. Y. Chong, “A Convolutional
Neural Network for Network Intrusion Detection System,” "Proc. Asia-Pacific Adv. Netw.,
vol. 46, no. 0, pp. 50–55", 2018.
[3] U. Gur Çekmez et al., “Derin Ö˘ grenme ile A˘ g Anomali Tespiti Network Anomaly
Detection with Deep Learning Ozgur Koray Sahingoz,” 2018, pp. 1–4.
[4] A. Chawla, B. Lee, S. Fallon, and P. Jacob, “Host Based Intrusion Detection System
with Combined CNN/RNN Model,” "Lect. Notes Comput. Sci. (including Subser. Lect.
Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11329 LNAI", pp. 149–158, 2019.
[5] S. Naseer and Y. Saleem, “Enhanced network intrusion detection using deep
convolutional neural networks,” "KSII Trans. Internet Inf. Syst., vol. 12, no. 10, pp. 5159–
5178, 2018, doi: 10.3837/tiis.2018".10.028.
Annexure:
Annexure I: Form A-Title Approval (for offline mode)
Annexure II: Form B-Market and financial feasibility (verify from guide)
Annexure III: Literature survey paper or links