Found 1009 Articles for Safe & Security

What are the Dynamic Password Authentication in information security?

Ginni
Updated on 09-Mar-2022 07:53:11

1K+ Views

Dynamic Password is also known as One Time Password. It is used to solve the traditional problems which occur when the static Password authentication cannot cope with eavesdropping and replaying, making, guessing, etc.Using dynamic password, uncertainties will be treated in authentication information during the procedure of lodging to make authentication information different every time, which can enhance the security of information in the procedure of lodging. This technology can effectively prevent replay attack, and solve the issues that the static password is likely to be stolen in transmission and database.There are three fields which are transmitted to authentication server or ... Read More

How does Smart Card Authentication work?

Ginni
Updated on 09-Mar-2022 07:49:58

517 Views

Smart Card Authentication is a means of checking users into enterprise resources including workstations and applications using a physical card in tandem with a smart card reader and application on the workstation. Smart card authentication is hugely secure but it has a poor user experience and is expensive to deploy and maintain.Smart card systems enable a distributed transaction network, without physical link between network terminals. The smart card is the data distribution tool that supports the data used in transactions. The terminal or card acceptor device (CAD) processes the smart card supplied data based on business processes for its application.A ... Read More

What are the applications of smart card in information security?

Ginni
Updated on 09-Mar-2022 07:48:28

319 Views

There are several applications of smart card which are as follows −A smart card is a device generally the size and shape of a credit card and includes one or more integrated chips that implements the functions of a computer with a microprocessor, memory, and input/output. Smart cards can be used to offer increased functionality and an increased level of security over memory cards when used for recognition and authentication.Smart Cards are plastic cards that have integrated circuits or storage receptacles embedded in them. Smart cards with integrated circuits that can perform transactions and are defined as “active” smart cards.A ... Read More

What is a smart card in information security?

Ginni
Updated on 09-Mar-2022 07:45:50

648 Views

A smart card is a card that stores data on a microprocessor or memory chip instead of the magnetic stripe found on ATM and credit cards. A smart card is a secure microcontroller that is generally used for generating, saving and working on cryptographic keys.Smart card authentication supports users with smart card devices for the goals of authentication. Users linked their smart card to a host device. Software on the host computer connect with the keys material and other secrets saved on the smart card to authenticate the user.Smart cards are ubiquitous because of their strong authentication security and identity ... Read More

What are the steps used in Biometric authentication systems?

Ginni
Updated on 09-Mar-2022 07:44:18

257 Views

Biometrics is the recognition of a person by the measurement of their biological characteristics. For instance, users identifying to a computer or constructing by their fingerprint or voice is treated a biometrics identification.Biometric devices measure biological elements (like human features) to perform functions, including logging health/fitness data and authenticating users. There are some uses for the technology and a multiple methods for its implementation. Types of biometric data such as visual, audio, spatial and behavioral. Biometric security devices play an essential role in checking a person's identity by enforcing access control methods through their unique biological traits.Biometric devices authenticate users ... Read More

What are the types of attacks on Biometric devices in information security?

Ginni
Updated on 09-Mar-2022 07:41:43

539 Views

There are four types of attacks on biometrics devices which are as follows −Processing and Transmission Level Attacks − Several biometric systems transmit sample information to local or remote offices for processing, it is also necessary that this transmission be protect, test the transmission be intercepted, read, or altered.Most biometric systems encrypt information in transit, but not some applications and devices allow themselves to encryption. Security techniques including encryption are view as deployer-specific element of system design.Multi-factor authentication can take two primary forms such as the need of multiple biometrics or the use of biometrics in conjunction with smart cards ... Read More

What are biometric devices in information security?

Ginni
Updated on 09-Mar-2022 07:39:07

175 Views

Biometrics is the recognition of a person by the measurement of their biological characteristics. For instance, users identifying themselves to a computer or constructing by their fingerprint or voice is treated a biometrics identification.Biometric devices measure biological elements (like human features) to implement functions, including logging health/fitness information and authenticating users. There are multiple uses for the technology and a several methods for its implementation. Types of biometric data involve visual, audio, spatial and behavioral. Biometric security devices play an essential role in checking a person's identity by enforcing access control methods through their unique biological traits.Biometrics provide a reliable ... Read More

What are the types of Security Attacks on RFID Systems?

Ginni
Updated on 09-Mar-2022 07:37:21

659 Views

There are several types of security attacks on RFID Systems which are as follows −Physical Attack − The vulnerabilities in the implementation of larger level or transmission protocols, which are represented in the manufacturing process of RFID can be used in physical-layer attacks. One of the significant attacks which is categorized in physical-attacks is traceability attack, which abuses the alteration in the manufacturing process of tags.Spoofing Attack − In this method, false information which the system accepts is created by an attacker. Some important information that can be altered in RFID networks including MAC Address, IP, and domain name are ... Read More

What are the disadvantage of RFID in information security?

Ginni
Updated on 09-Mar-2022 07:35:30

273 Views

In RFID, it is a technology that incorporates the need of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely recognize an object, animal or person.The slow cost adoption of the RFID technology in the mass industry even after the presence of a large number of advantages clearly points that this technology is not ready for such a broad spread adoption because of a number of limiting factors. There are various disadvantage of RFID which are as follows −The RFID technology proves to be unreliable in channels such as metals or liquids where ... Read More

What are the advantage of RFID technology in information security?

Ginni
Updated on 09-Mar-2022 07:33:12

100 Views

The advantage of RFID which are as follows −RFID in the transportation sector − RFID tags can be employed in car services for storing recognition numbers of vehicles along with other data which can then be used for implementing automatic inventories using static RFID readers appropriately placed at various locations including parking lots, exits of garage etc.In the airline industry, RFID tags can be used for effective element of baggage based on routing location. This will lead to automated routing of the baggage with minimal error and a large deduction in losses incurred because of misrouting or loss of baggage. ... Read More

Advertisements