StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Password Management Protocol vulnerabilities - Essay Example

Cite this document
Summary
Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Password Management Protocol vulnerabilities
Read Text Preview

Extract of sample "Password Management Protocol vulnerabilities"

Password Management Protocol vulnerabilities By of the affiliation Department’s Paper’s Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized access. However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords.

We will through the usage of one application that can show and copy passwords saved in the browser. Many users use autocompleting in their browser and this main threat for the password security and we will show It on the example of one non-malicious software called “WebBrowserpassview”.We will analyze the password storage protocol used in the browser like Google Chrome, Opera, Firefox Mozilla, Seamonkey. These browsers store their passwords almost equally and their passwords can be revealed to the hacker with the help of the tool we mentioned above.

Because mechanism of the encrypting passwords is very weak and even the simplest applications can retrieve them from their register, moreover, this application has good interface and getting passwords can present problem for the hacker, because it needs physical contact with the target computer, however, there are thousands modifications of this software which have hidden interface and after the running can send all passwords on the email or FTP-server of the hacker. Therefore saving of the passwords in the browser is quite doubtful method of password storage (10 Most Popular Password Cracking Tools 2014).

Functioning of the “WebBrowserPassview”Here we can see good interface for the passwords viewing and various operations with them. This application allow user to save them to the file. This file can be copied to other emails and then used in malicious activities like the accessing some bank-accounts without the two-step authorization that requires special key that system sends to the cell-phone of the user or to the email. Here this application presented all our passwords with the description of fields in which they were entered.

It helps hacker easily reenter all these passwords to the necessary fields. There are many ways to protect computer from such attacks. The first way – avoiding downloading some software, regardless from the content and specifications written on the site, if the site is not Microsoft.com or other associated site to the OS user use. Creators of the password storage systems can use special encrypting protocols which will help to defend passwords from retrieving with some application. Moreover, developers can use key file that will give access to the passwords, we mean any file in the system that will be necessary for accessing passwords and after the beginning of the work with such application this file give access to all passwords, otherwise they will be hidden and encrypted.

For all users who use the browsers they can buy or just download free version of the “KeePass Password Safe. This application helps to save passwords from the copying and send them to the FTP-server through the protected chanel and the storage of the password is protected with the two-stage protection with the Master-Password and the special file with the encoding key which should exist on the computer to access passwords, so user can take this file on the flash-storage and access his/her passwords on other computers (KeePass Password Safe 2011).

ReferencesKeePass Password Safe 2011, Viewed 16 January 2015, 10 Most Popular Password Cracking Tools 2014, Viewed 16 January 2015, http://resources.infosecinstitute.com/10-popular-password-cracking-tools/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Password Management Protocol vulnerabilities Essay”, n.d.)
Password Management Protocol vulnerabilities Essay. Retrieved from https://studentshare.org/information-technology/1674220-password-management-protocol-vulnerabilities
(Password Management Protocol Vulnerabilities Essay)
Password Management Protocol Vulnerabilities Essay. https://studentshare.org/information-technology/1674220-password-management-protocol-vulnerabilities.
“Password Management Protocol Vulnerabilities Essay”, n.d. https://studentshare.org/information-technology/1674220-password-management-protocol-vulnerabilities.
  • Cited: 0 times

CHECK THESE SAMPLES OF Password Management Protocol vulnerabilities

One Time Passwords

Originally based on S/KEY, a seminal OTP system developed at Bellcore, OTP (One-time password) technology is a system that requires a new password every time a user authenticates.... This basic principle of an OTP solution effectively protects the system against replay attacks, or… ny attack that attempts to use an intercepted password, hence, making it difficult for potential intruders to gain unauthorized access to the system (Bhaiji, 2009). Mathematical algorithm: In this type, the system requires an initial seed (PIN or pass phrase) to generate The new passwords are generated by the system using a one-way hash function (Bhaiji, 2009)....
5 Pages (1250 words) Research Paper

Securing Jacket-X Corporations Network against Cyber Threats

Key areas to address so as to avert cyber It is important for Jacket-X to implement ways of detecting and securing networks so as to counter cyber threats vulnerabilities such as email spoofing, denial of service attack, malware intrusion, spywares, hackers as well as data and information theft that are implemented through the network (Roberta Bragg, 2004)....
5 Pages (1250 words) Coursework

What will replace passwords

The entry of the internet in the market has revolutionalized the way people interact and driven the financial development through providing a platform for transacting businesses.... With the increasing levels of globalization that results mainly from liberalization of markets,… This has led to lowering of internet rates, an aspect that has made it very easy for the general population to get easy access to the At the same time, social media has created a medium for people to interact and share their personal information with other people located in different parts of the world....
11 Pages (2750 words) Research Paper

Nuclear Plant Password Policy

The goals are detection, prevention, and recovery2) What are applicable forms of vulnerabilities?... Atheotherhandlikelihoodloss There are situations where a risk is said to be vulnerability but in other cases, some vulnerabilities occur without any risks.... They include confidentiality, integrity, and privilege management.... This is an example of: Privilege management Activity 1-31) Brian works at a bank.... Once an identity is, the system checks and confirms that the user allowed leaving the lobby and entering the facility, and the Nuclear Plant password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?...
4 Pages (1000 words) Essay

Performance and Security of Windows Server

The paper 'Performance and Security of Windows Server' presents Windows Server 2003 which is the next generation of server operating systems.... It is more scalable and delivers better performance as compared with previous server products from Microsoft.... hellip; By default, the server components of Windows Server 2003 are disabled for security purposes....
8 Pages (2000 words) Case Study

IPV6 Security Enhancement

Assuming that a company allows corporate officers, and middle managers to have laptops and home computer access to corporate networks, explain how these computers might be used to compromise a corporate network and then explain several ways that the network administrator might use policy and network tools to minimize these vulnerabilities.... he users of laptops from their homes might misplace their usernames and password to malicious people.... Here, hackers will then use the password and username to gain access into the corporate network by either sending spam emails pretending they were sent by the holder of the password....
8 Pages (2000 words) Assignment

The Management of Information Systems with Regards to Securing Such Systems

Apart from this advancement in technology of breaching security, the internet also poses a considerable security threat and vulnerabilities.... The main reason for this challenge is the inability of developers to anticipate fully all the potential vulnerabilities of a system during its development.... ackers, often referred to as unauthorized users, exploit vulnerabilities in computer systems to gain access.... vulnerabilities are weak points that can be potential targets and access points into a system....
9 Pages (2250 words) Coursework

Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration

The paper “Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration" concerns factors that need to be considered to properly choose a type of scanning or enumeration to prevent vulnerabilities that might put corporative data at risk of getting access.... All these techniques form part of the penetration testing means of accessing an organizations information system and identify any existing and potential vulnerabilities (Allsopp, 2017)....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us