StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How to Prevent Illegal Access to Personal Data - Assignment Example

Cite this document
Summary
From the paper “How to Prevent Illegal Access to Personal Data?” it is clear that the problem of creating optimal protecting access to personal data remains relevant. A traditional password system is simple but not reliable, encryption, cryptography, are too complicated for a wide audience…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
How to Prevent Illegal Access to Personal Data
Read Text Preview

Extract of sample "How to Prevent Illegal Access to Personal Data"

Passwords are used to prevent illegal access to imperative information, user accounts, such as computer system, e-mails, financial accounts etc. and they must also ensure to provide guaranteed security of the crucial information. However, a traditional password verification system inquires the user for provision of a surreptitious sequence of characters (password) to ensure that a right person/user is getting access to his personal system. Simplicity is the power of this method, however, the simplicity is the biggest problem as well, since it can easily be get hacked by the intruder by many reasons.

To counter this problem, many solutions are available that includes Virtual Private Networks (through tunneling Protocols), Encryption/decryption, RSA (through Public Key Cryptography) etc. but these are too complex to apply at large group of general public.Keeping in view the above weaknesses of the traditional password system, there is an immense requirement to design an interactive password system as previously done by Tsutomu Matsumoto (1996), Michael K. Reiter (1999), Taekyoung Kwon (2000) and many other great authors of information security.

However, the some interactive systems were complex, while the others were time consuming. In order to design interactive password system, we need to take strings from the user based on several questions rather than a single string password. Subsequently, we have to use the input strings in a meaningful manner and introduce randomness to develop an interactive password system. Involvement of randomness on the basis of the user’s questions might be easy for the user to remember the answers of the questions; the user will need to remember/keep the answers or rules of the questions rather than keeping a password string.

Once the input strings have been taken from the user, in order to further progress the design of the interactive password system, there could be two ways i-e first is to generate password utilizing input string by different cryptography, encryption decryption, involvement of special characters, mixture of small and capital characters along with numbers, self generation algorithm as done by William H. Haubert (2002) etc. or the second way could be to generate a rule based system to create the surreptitious set of rules and regulations, control the rules that would be associated to the users and subsequently, the actual login interface for the said system.

The above design will not allow users to select an easy password like MS Outlook’s Password Management Protocol. As the design is based on an interaction with the user’s secret questions and an involvement of randomness makes it harder for intruders to guess the password as well as for the hacking software. Reference ListAnderson, J., Ross. 2008. Security Engineering – 2nd Edition. Canada: Wiley Publishing Inc.William H. Haubert. 2002. An Interactive Approach to Secure and Memorable Passwords.

University of Virginia

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1454440-dqweek
(DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1454440-dqweek.
“DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1454440-dqweek.
  • Cited: 0 times

CHECK THESE SAMPLES OF How to Prevent Illegal Access to Personal Data

A Perilous Journey Through the Health Care System

The personal statement "A Perilous Journey Through the Health Care System" points out that the internship program which I went through was one of the most significant experiences of my life.... It shall focus on how I managed to apply the four basic functions of management, which include: planning, leading, etc.... A breakdown of the 200 hours shall then be presented in terms of the work conducted, the number of hours worked per week, duties and responsibilities, additional skills or knowledge involved, and how beneficial the internship experience was in my professional development....
19 Pages (4750 words) Personal Statement

Why I Want to Study at UC Berkeley

I would like to define myself as an ambitious and forward thinking individual, possessing all the essential qualities that are required for effective business management.... My strengths lie in the areas of decision making, people management, analytical judgment, identification of… I also possess strong and effective team work skills as I am able to work individually as well in a group....
4 Pages (1000 words) Personal Statement

Software as a Service Methodology

My aim is to change the traditional style of data storing into improved form of data storing in cloud computing as it will help the organization's recovery plan.... My aim is to change the traditional style of data storing into improved form of data storing in cloud computing as it will help the organization's recovery plan.... I have two more certificates, one of Computer Hacking Forensic Investigator (CHFI) v8 from EC- Council and another from Access data which is of Mobile Device Forensics (Kealey, 2005)....
2 Pages (500 words) Personal Statement

You Can Prevent Global Warming

The aim of the paper “You Can Prevent Global Warming” is to analyze both the pros and cons of both manuals as well as the electronic way of data maintaining and storage.... The electronic way of storing data scores over the manual way due to many reasons.... hellip; The author states that there is a lot of scope for manual errors in the manual entry of data which will be reduced to a greater extent in case of the electronic way as we will be providing a dictionary interface which will help users who are not so good at penmanship....
25 Pages (6250 words) Personal Statement

Measuring Crime Rate in the UK

These are the police recorded crime data, the national victimization survey, and the self-report studies.... Moreover, a significant portion of the population also believes that political agenda often interferes with the data gathering process as well as in the release of official interpretations of these figures.... Distrust also lies on the aggregate national figures and how this data is interpreted and used (“Overcoming Barriers”, 2)....
14 Pages (3500 words) Personal Statement

Reflection on Experience Studying Postgraduate Bioethics Course

   … The bioethics postgraduate course that I am going to describe in this paper has been a wonderful experience for me as I learnt many personal and professional ethical considerations in this course.... The course that I attended taught me many important things which are going to help me in my personal and professional life.... The paper "Reflection on Experience Studying Postgraduate Bioethics Course" describes what I learnt during this course, and how my learning experience was in general....
6 Pages (1500 words) Personal Statement

Transportation Security

The writer of the paper “Transportation Security” states that to a nation like the USA, which is both a developed and developing country, the issue can bring down the nation.... The aim of solving legal issues that can help officials what they can and what they cannot.... America needs unity of effort to achievement....
6 Pages (1500 words) Personal Statement

Design and Access

his design and access portfolio supports the planning application proposed for the anaerobic digester and aligns itself with the provisions of part five of the Sharpness Docks Estate Strategy (2013), which elucidate the planning statement.... This paper highlights that sustainability has been defined by environmentalists as the practice of efficient and careful stewardship of resources towards meeting the needs of the society by individuals, and businesses....
12 Pages (3000 words) Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us