time based authentication secure your system

8
By:- Sanjay Kumar Infosec Consultant [email protected]

Upload: sanjay-kumar-seeking-options-outside-india

Post on 21-Jun-2015

1.428 views

Category:

Technology


3 download

DESCRIPTION

Time Based Authentication- Secure Your system!

TRANSCRIPT

Page 1: Time based authentication secure your system

By:-

Sanjay Kumar Infosec [email protected]

Page 2: Time based authentication secure your system

Traditional Technology

In earlier time computer users make their password simple as they ease to remember.

Their password were telephone number, children name, places, monuments etc.

Authentication of the system were easy at evaluation of computers.

Page 3: Time based authentication secure your system

Current Scenario

Everyone is using strong password.

Mix up of Special Characters, Numbers, Idioms, Case sensitive, Dleet (language of hacker).

Example Computer = “(0Mp4T(-R”

Page 4: Time based authentication secure your system

New Trend

Authentication is very complex in this modern age.

Multilevel Authentication.

Biometric Devices (Retina Scanner) to Access System.

Page 5: Time based authentication secure your system

New Technology of Authentication

“Time based Authentication with Password.”

Time Based Authentication is best ever technology for those who think their password is not safe enough for authentication.

………Continue

Page 6: Time based authentication secure your system

Example of Time based Authentication If your password is Password then the

server side code should also implemented for checking whether the Password is coming with time based as it registered at creation time or not.

Like:- Pa takes 3 sec to enter as takes 7 sec to enter sword takes 8 sec to enter

Page 7: Time based authentication secure your system

ConclusionTo protect from being brute force, a user should take following precautions:

1.Password should be at least 8 character long.

2.Should have special characters3.Should have good mix up of letter case and numbers.4.Time Based authentication should be implement at server side.

Page 8: Time based authentication secure your system

Thank You

All suggestions are welcome at mail.