By:- Sanjay Kumar  Infosec Consultant [email_address]
Traditional Technology <ul><li>In earlier time computer users make their password simple as they ease to remember. </li></...
Current Scenario <ul><li>Everyone is using strong password. </li></ul><ul><li>Mix up of Special Characters, Numbers, Idiom...
New Trend <ul><li>Authentication is very complex in this modern age. </li></ul><ul><li>Multilevel Authentication. </li></u...
New Technology of Authentication <ul><li>“ Time based Authentication with Password.” </li></ul><ul><li>Time Based Authenti...
Example of Time based Authentication <ul><li>If your password is  Password  then the server side code should also implemen...
Conclusion <ul><li>To protect from being brute force, a user should take following precautions: </li></ul><ul><li>Password...
Thank You <ul><li>All suggestions are welcome at mail. </li></ul>
Upcoming SlideShare
Loading in...5
×

Time based authentication secure your system

1,437

Published on

Time Based Authentication- Secure Your system!

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,437
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Time based authentication secure your system

  1. 1. By:- Sanjay Kumar Infosec Consultant [email_address]
  2. 2. Traditional Technology <ul><li>In earlier time computer users make their password simple as they ease to remember. </li></ul><ul><li>Their password were telephone number, children name, places, monuments etc. </li></ul><ul><li>Authentication of the system were easy at evaluation of computers. </li></ul>
  3. 3. Current Scenario <ul><li>Everyone is using strong password. </li></ul><ul><li>Mix up of Special Characters, Numbers, Idioms, Case sensitive, Dleet (language of hacker). </li></ul><ul><li>Example Computer = “ (0Mp4T(-R ” </li></ul>
  4. 4. New Trend <ul><li>Authentication is very complex in this modern age. </li></ul><ul><li>Multilevel Authentication. </li></ul><ul><li>Biometric Devices (Retina Scanner) to Access System. </li></ul>
  5. 5. New Technology of Authentication <ul><li>“ Time based Authentication with Password.” </li></ul><ul><li>Time Based Authentication is best ever technology for those who think their password is not safe enough for authentication. </li></ul><ul><li>……… Continue </li></ul>
  6. 6. Example of Time based Authentication <ul><li>If your password is Password then the server side code should also implemented for checking whether the Password is coming with time based as it registered at creation time or not. </li></ul><ul><li>Like:- </li></ul><ul><li>Pa takes 3 sec to enter </li></ul><ul><li>as takes 7 sec to enter </li></ul><ul><li>sword takes 8 sec to enter </li></ul>
  7. 7. Conclusion <ul><li>To protect from being brute force, a user should take following precautions: </li></ul><ul><li>Password should be at least 8 character long. </li></ul><ul><li>Should have special characters </li></ul><ul><li>Should have good mix up of letter case and numbers. </li></ul><ul><li>Time Based authentication should be implement at server side. </li></ul>
  8. 8. Thank You <ul><li>All suggestions are welcome at mail. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×