Abstract

The cyber world can be secured only through the systematic development of security measures for both system to network security. It cannot be achieved through haphazard seat-of-the-pants methods. Every system developed by an organization demands a layer of security for its' safe functioning. This security layer is built by various techniques to ensure confidentiality, integrity, and availability of organizational systems. As an entry point of the security layer, authentication mechanisms play a crucial role. The organizations provide user access to the services and systems by using various authentication mechanisms namely, hash code, CAPTCHA, and OTP. If such entry points are made strong, the systems and networks can be protected well from unauthorized intrusions. This article focuses on developing novel authentication mechanisms for hash code, CAPTCHA, and OTP, which tightens the authentication mechanisms of cybersecurity.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call