Claim Missing Document
Check
Articles

Found 3 Documents
Search

Highly Secure and Easy to Remember Password-Based Authentication Approach Sadat, Sayed Elham; Lodin, Hedayatullah; Ahmadzai, Nazak
Journal of Social Science Utilizing Technology Vol. 2 No. 4 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i4.1505

Abstract

Background. Everyone connected and using the Internet is concerned regarding the security and also the privacy of their sensitive information available on the Internet. As authentication is the fundamental part of security, there are different authentication mechanisms through which the systems can be secured. The password-based authentication mechanism is a cheap and easy method for enforcing authentication in the systems for many years. The weakest aspect in password security is human, as they choose weak and easy to guess passwords or a highly secure and complex password which might be difficult to remember and recover the password. Purpose. In this paper, a password generation system is proposed which generates a password based on the user’s input like, time and location data. The system generates a password that is highly secure, easy to remember, easy to recover, and can effectively defend against Brute force and dictionary attacks. Method. This study utilizes a descriptive quantitative approach to develop a password-based authentication system focused on security and memorability. The population includes digital users needing secure access, with samples drawn from various groups to ensure comprehensive feedback. Data collection involves password strength evaluation tools and user feedback questionnaires. Procedures include developing a password generation algorithm using user inputs, followed by testing its security and conducting usability assessments. Feedback will guide the refinement of the system to enhance user experience and security. Results. The generated passwords using the porposed system have been checked in three online password checkers, which verifies that the system is generating highly secure and crack resistant passwords and the method for recovering the forgotten password was efficient and easy. The system is implemented using PHP scripting language with a user-friendly environment. Conclusion. This paper proposes a password-based authentication system that generates secure and memorable passwords using user input, time, and location data. The passwords were validated through three online checkers, demonstrating high security and resistance to attacks. Future enhancements could include voice recognition to improve security and personalization, making the system more user-friendly while maintaining low costs.
Identifying and Mitigating Web Application Vulnerabilities: A Comparative Study of Countermeasures and Tools Sadat, Sayed Elham; Naseri, Mohammed Fahim; Salamzada, Khosraw
International Journal Software Engineering and Computer Science (IJSECS) Vol. 4 No. 3 (2024): DECEMBER 2024
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v4i3.3138

Abstract

In the current age of technology, web applications and websites have experienced significant growth. This expansion has made their security a critical area of research. Web applications offer benefits, which makes user’s lives easier. In this paper, common web application vulnerabilities and effective strategies to mitigate the vulnerabilities are identified using a comparative study of countermeasures and open-source web application vulnerability assessment tools. Specifically, the top ten web application vulnerabilities and their countermeasures are investigated. Accordingly, several open-source vulnerability assessment tools are also introduced. The review highlights that with the developments and deployments of web applications on the internet, users are chased by a remarkable number of cyber-attacks. Attackers take advantage of available vulnerabilities in a web application or website, such as SQL injections, cross-site scripting, and broken authentications. This paper concludes by providing the best practices to mitigate cyber-attacks on web applications and suggests future directions for enhancing vulnerability assessment through machine learning techniques
Highly Secure and Easy to Remember Password-Based Authentication Approach Sadat, Sayed Elham; Lodin, Hedayatullah; Ahmadzai, Nazak
Journal of Social Science Utilizing Technology Vol. 2 No. 4 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i4.1505

Abstract

Background. Everyone connected and using the Internet is concerned regarding the security and also the privacy of their sensitive information available on the Internet. As authentication is the fundamental part of security, there are different authentication mechanisms through which the systems can be secured. The password-based authentication mechanism is a cheap and easy method for enforcing authentication in the systems for many years. The weakest aspect in password security is human, as they choose weak and easy to guess passwords or a highly secure and complex password which might be difficult to remember and recover the password. Purpose. In this paper, a password generation system is proposed which generates a password based on the user’s input like, time and location data. The system generates a password that is highly secure, easy to remember, easy to recover, and can effectively defend against Brute force and dictionary attacks. Method. This study utilizes a descriptive quantitative approach to develop a password-based authentication system focused on security and memorability. The population includes digital users needing secure access, with samples drawn from various groups to ensure comprehensive feedback. Data collection involves password strength evaluation tools and user feedback questionnaires. Procedures include developing a password generation algorithm using user inputs, followed by testing its security and conducting usability assessments. Feedback will guide the refinement of the system to enhance user experience and security. Results. The generated passwords using the porposed system have been checked in three online password checkers, which verifies that the system is generating highly secure and crack resistant passwords and the method for recovering the forgotten password was efficient and easy. The system is implemented using PHP scripting language with a user-friendly environment. Conclusion. This paper proposes a password-based authentication system that generates secure and memorable passwords using user input, time, and location data. The passwords were validated through three online checkers, demonstrating high security and resistance to attacks. Future enhancements could include voice recognition to improve security and personalization, making the system more user-friendly while maintaining low costs.