Question

In: Computer Science

Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing...

Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The first is that usernames and passwords are frequently lost by negligent users. In addition, adversaries have, on occasion, fooled employees into giving up their authentication information via social engineering attacks. Discuss at least two things could you do to strengthen the use of basic username and password authentication, as discussed in the course textbook.

Your answer should be approximately 200-250 words in length.

It have to be your own words and no outside sources.

Solutions

Expert Solution

In this era of the digital age, everything is developing on the positive side and negative side too. Every technology comes with the innovation of crack. When it comes to security, low-level companies don't want to spend money and resources in spite of that this is the big issue which classifies the standards of companies. The methods which can be followed to secure the passwords are in general are very common nowadays like using special characters, small alphabets, and capital letters and digit all of them together in a password. But besides this, I am going to tell you what new technology can make a revolution in the field of security.

We are living in a world of Artificial intelligence, machine learning is a tool which can help in improving the security of your system. for example, if we are following the traditional methods of authentication except for fingerprint or face recognition, we can use a linear regression model to predict the strength of the password as compared to other users. The model we train needed to keep updated on a daily basis as we are increasing the number of passwords and we can use other models to predict the passwords for the user according to its taste which will help him to make a new password. For example GAN, we put some noises collected through the users and using the previous responses we can generate a new strong password for a new user. Now this newly generated password can be tested using regression for validating the strength of the password. Another thing which can be done using similar technology is that we can use the recommender system approaches like content-based and collaborative approaches to finding the taste of the user and accordingly suggest the new password.  

Besides the field of machine learning, in the context of traditional programming approaches, When we receive the password from a user it will be hashed according to our hashing service. To improve our service we can improve our hashing method so that no two passwords have a similar hash function. Since the hackers try to find out our hash functions using reverse engineering, they can be successful in doing that. but when we don't have similar hashed value we can protect more users from the attacks. So that while receiving the hashed value of a new password, we can suggest the user to change the password as the system has the same hashed value or same passwords for other users like we suggest for usernames to new users, This can be helpful in improving the authentication using username and password.


Related Solutions

4 usernames and 4 passwords in arrays. also each have checking and saving balances. DONE IN...
4 usernames and 4 passwords in arrays. also each have checking and saving balances. DONE IN RAPTOR You are writing a program that will act like an ATM machine by the end of this course. In order to access the ATM, the customer must enter their user name and their passcode. After 3 incorrect attempts at entering the user name and password, the program will end. The list of legitimate users along with their user ID, passcode and account balance...
How does two factor authentication work and why is it better than just passwords? Detailed answer...
How does two factor authentication work and why is it better than just passwords? Detailed answer please.
You have been assigned to report to your network administrators on the use of Teredo
Case Project 4-1: Tunneling IPv6 You have been assigned to report to your network administrators on the use of Teredo. Prepare a two-page memo that outlines why Teredo was developed, how it is implemented in Windows operating systems, for which types of networks it is appropriate, and how long it should be implemented.
You have joined a company as a network security analyst. Your CTO came to know you...
You have joined a company as a network security analyst. Your CTO came to know you are a graduate from MIT Melbourne/Sydney and successfully completed a VPN unit. Therefore, you have been asked to develop a security plan for your customers and remote managers for their Internet access to the business. You need to analyse the following cases and recommend the solutions for the question quen-1) You want to assist customers in building trust with your company. Discuss with your...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a networking problem from the internet and design the networking solution. Use lucidchart or vision.
You have network address as 192.1.1.0/24. Subnet it into /27 network.
You have network address as 192.1.1.0/24. Subnet it into /27 network.
Your firm employs 10 employees. You have just signed a new contract to construct a small...
Your firm employs 10 employees. You have just signed a new contract to construct a small store in a local city. However, due to the coronavirus pandemic, you are experiencing supply chain problems relative to your raw materials. Discuss in detail how you would approach this problem.
You have been using your phone and your school's Wi-Fi network to access hosts on the...
You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.
You have been named the network administrator for a large insurance firm. Your responsibility is to...
You have been named the network administrator for a large insurance firm. Your responsibility is to come up with a plan for the network infrastructure, which includes number of servers, network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in deploying the infrastructure (LANs, firewalls, routers, switches, IDS and sensors, servers, database servers, and addressing scheme) including specifics about the configurations. An understanding of the security issues the company...
Describe context-based authentication and how that is handled in either your company or another that you...
Describe context-based authentication and how that is handled in either your company or another that you can use as an example. Does it work for them? Where are the downfalls? How is GPS spoofing accomplished? What is the goal for those that try to do this? Are they a potentially big threat? What are the easiest ways to use personnel when attacking a company? Where are the easy entries to this type of attack? What are the best ways for...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT