100% found this document useful (1 vote)
862 views14 pages

Password and Authentication (PPT Final)

This document discusses password and authentication in cyber security. It covers topics like password management, hashing passwords with salt to make them more secure, choosing suitable passwords to prevent brute force attacks, updating passwords regularly, and multi-factor authentication. It also discusses graphical passwords as a form of authentication using images instead of text passwords and their advantages in providing security over text passwords.

Uploaded by

Rohit Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
862 views14 pages

Password and Authentication (PPT Final)

This document discusses password and authentication in cyber security. It covers topics like password management, hashing passwords with salt to make them more secure, choosing suitable passwords to prevent brute force attacks, updating passwords regularly, and multi-factor authentication. It also discusses graphical passwords as a form of authentication using images instead of text passwords and their advantages in providing security over text passwords.

Uploaded by

Rohit Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

PASSWORD AND

AUTHENTICATION
A CYBER SECURITY AWARENESS
PASSWORD AND AUTHENTICATION
A CYBER SECURITY AWARENESS
CONTENTS

 INTRODUCTION
 PASSWORDS MANAGEMNET IN CYBER SECURITY
 PASSWORD HASH SALTING
 SUITABLE PASSWORD
 AUTHENTICATION
 MULTI-FACTOR AUTHENTICATION
 GRAPHICAL PASSWORD AUTHENTICATION
INTRODUCTION

 CYBER SECURITY –
It refers to a set of techniques used to
protect the integrity networks, programs and
data from attack, damage or unauthorized
access.
There are many different ways that an
attacker can infiltrate an IT system and most
of them rely on pretty similar techniques
One of them is Password attack
PASSWORD MANAGEMENT IN CYBER SECURITY

 Methods to Manage Password


1. Strong and long passwords
2. Password Encryption
3. Make the password pass the test
4. Updating passwords frequently
PASSWORD HASH SALTING

A more secure way to store a password is to


transform it into data that cannot be
converted back to the original password.
This mechanism is known as hashing.

Key points in Hashing :


1.Slight changes will produce an entirely
different hash value
2. Hash is similar to a fingerprint
SUITABLE PASSWORD

BRUTE FORCE ATTACK


Brute-force attack is an attempt to discover a
password by systematically trying every possible
combination of letters, numbers, and symbols
until you discover the one correct combination
that works. 
CHANGING PASSWORDS

 WHEN SHOULD WE CHANGE OUR PASSWORDS ?


1. If You Suspect Unauthorized Access.  
2. If You Discover Malware or Other Phishing Software.
3. Shared Access.
4. Logging in at Public Places.
5. If You Haven’t Logged in for A While. 
DO’s and DON’Ts IN PASSWORD HABITS
AUTHENTICATION

Authentication is the process of determining


whether someone or something is, in fact, who or
what it says it
 Verify the identity of a user , process or device
 Verifyingpermission to access an electronic device or
computer network
AUTHENTICATION AUTHORIZATION and
ENCRYPTION

AUTHENTICATION
•Authentication is used by a server when the server needs
to know exactly who is accessing their information or site.
•Authentication is used by a client when the client needs
to know that the server is system it claims to be.

AUTHERIZATION
•Authorization is a process by which a server determines if
the client has permission to use a resource or access file.

ENCRYPTION
•Encryption involves the process of transforming data so
that it is unreadable by anyone who does not have a
decryption key.
MULTI-FACTOR AUTHENTICATION

 Knowledge-based authentication factor


Something You Know ( password )
 Location-based authentication factor
Something you have ( OTPs , Smart card)
 Behavior-based authentication factor
 Something You are ( Fingerprint or Biometric method )
GRAPHICAL USER AUTHENTICATION

 It is a form of authentication using images rather than letters, digits, or


special character
GRAPHICAL USER AUTHENTICATION

 Advantages
1. User-friendly
2. Provides high security
3. Dictionary attacks are infeasible
 Disadvantages
1.Registration and login take too long
2.Requires more storage space because of images
THANK
YOU

You might also like