Abstract

Passwords are considered the most commonly used method of authentication. Unfortunately, weak passwords are known to be the main cause of many cyber attacks. With stronger passwords, it is believed that this first line of defence would be able to reduce the risk of cyber attacks, trespass and information exposure. A password strength metre application was, therefore, developed so that users can try out the passwords of their choice before actually deciding to register them. Although the application contains such information as password entropy, password quality index and password complexity index, the data is presented in a user-friendly way so that it is intuitive to any users.

Highlights

  • It cannot be denied that cyber attacks occur to individuals, small and large organisations almost, if not, daily

  • The password strength metre application consists of two main screens

  • Once the information is entered, the second screen is displayed. This screen presents the results of the calculation of the password strength metrics, which consists of the four indicators in graphical form

Read more

Summary

Introduction

It cannot be denied that cyber attacks occur to individuals, small and large organisations almost, if not, daily Many have put both time and resources on security mechanisms to make their information systems better equipped to withstand today’s cyber threats. They are identification, authentication, authorisation and accounting. Identification is when a user or an entity states their identity. Authentication is the confirmation of the stated identity That is, it is a process in which a user or an entity proves to a system that they are who really say they are. Many researchers have introduced methods that can be used to accomplish the mentioned goal These approaches have, become an integral part of the proposed password strength metre. The section gives explanation of the related principles and theories of how the strength and quality of a password can be measured

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call