Password Security Issues on an E-Commerce Site

2008 ◽  
pp. 3133-3141
Author(s):  
B. Dawn Medlin ◽  
Joseph A. Cazier ◽  
Dinesh S. Dave

With the exponential growth of the Internet and e-commerce, the need for secure transactions has become a necessity for both consumer and business. Even though there have been advances in security technology, one aspect remains constant: passwords still play a central role in system security. The difficulty with passwords is that all too often they are the easiest security mechanism to defeat. Kevin Mitnick, notably the most recognized computer hacker, made the following statement concerning humans and their passwords: …the human side of computer security is easily exploited and constantly overlooked. Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures addresses the weakest link in the security chain. (Poulsen, 2000) Without secure passwords, e-commerce sites invite online criminals to attempt fraudulent schemes that mimic the goods and services that legitimate e-commerce merchants offer. With increasing numbers of users on an increasing array of e-commerce sites, often requiring the use of passwords, users often choose to reuse the same simplistic password, and do so on multiple sites (Campbell, Calvert, & Boswell, 2003). For most computerized systems, passwords are the first line of defense against hackers or intruders (Horowitz, 2001). There have been numerous published articles that have created guidelines on how to create better or safer passwords with the following recommendations: 1. passwords should be memorized and not written down; 2. passwords should be an eight- or nine-character word or phrase, and end users should randomly add 3. passwords should contain a mixture of letters (both upper- and lowercase), numbers, and punctuation characters; and 4. passwords should never be words that can be commonly found in a dictionary. But if an individual adheres to security experts’ suggestions about password authentication, it usually involves a trade-off. If a password is easy to create and remember, it is most likely that it is easy for others to guess or a hacker to crack. Eventually, any password can be cracked. Password crackers use a variety of methods and tools that can include guessing, dictionary lists, or brute force attacks. Dictionary lists are created by using an automated program that includes a text file of words that are common in a dictionary. The program repeatedly attempts to log on to the target system, using a different word from the text file on each attempt. A brute force attack is a variation of the dictionary attacks, but it is designed to determine passwords that may not be included in the text file. In a brute force attack, the attacker uses an automated program that generates hashes or encrypted values for all possible passwords and compares them to the values in the password file (Conklin, White, Cothren, Williams, & Davis, 2004). Unfortunately, many of the deficiencies of password authentication systems arise from the limitations of human cognitive ability (Pond, Podd, Bunnell, & Henderson, 2000). The requirements to remember long and complicated passwords are contrary to a well-known property of human memory. First, the capacity of human memory in its capacity to remember a sequence of items is temporally limited, with a short-term capacity of around seven items plus or minus two (Kanaley, 2001). Second, when humans remember a sequence of items, those items cannot be drawn from an arbitrary and unfamiliar range, but must be familiar “chunks” such as words or familiar symbols. Third, the human memory thrives on redundancy. In fact, studies have shown that individuals’ short-term memory will retain a password for approximately 30 seconds, thereby requiring individuals to attempt to memorize their passwords immediately (Atkinson & Shiffrin, 1968).

Author(s):  
B. Dawn Medlin ◽  
Joseph A. Cazier ◽  
Dinesh S. Dave

With the exponential growth of the Internet and e-commerce, the need for secure transactions has become a necessity for both consumer and business. Even though there have been advances in security technology, one aspect remains constant: passwords still play a central role in system security. The difficulty with passwords is that all too often they are the easiest security mechanism to defeat. Kevin Mitnick, notably the most recognized computer hacker, made the following statement concerning humans and their passwords: …the human side of computer security is easily exploited and constantly overlooked. Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures addresses the weakest link in the security chain. (Poulsen, 2000) Without secure passwords, e-commerce sites invite online criminals to attempt fraudulent schemes that mimic the goods and services that legitimate e-commerce merchants offer. With increasing numbers of users on an increasing array of e-commerce sites, often requiring the use of passwords, users often choose to reuse the same simplistic password, and do so on multiple sites (Campbell, Calvert, & Boswell, 2003). For most computerized systems, passwords are the first line of defense against hackers or intruders (Horowitz, 2001). There have been numerous published articles that have created guidelines on how to create better or safer passwords with the following recommendations: 1. passwords should be memorized and not written down; 2. passwords should be an eight- or nine-character word or phrase, and end users should randomly add 3. passwords should contain a mixture of letters (both upper- and lowercase), numbers, and punctuation characters; and 4. passwords should never be words that can be commonly found in a dictionary. But if an individual adheres to security experts’ suggestions about password authentication, it usually involves a trade-off. If a password is easy to create and remember, it is most likely that it is easy for others to guess or a hacker to crack. Eventually, any password can be cracked. Password crackers use a variety of methods and tools that can include guessing, dictionary lists, or brute force attacks. Dictionary lists are created by using an automated program that includes a text file of words that are common in a dictionary. The program repeatedly attempts to log on to the target system, using a different word from the text file on each attempt. A brute force attack is a variation of the dictionary attacks, but it is designed to determine passwords that may not be included in the text file. In a brute force attack, the attacker uses an automated program that generates hashes or encrypted values for all possible passwords and compares them to the values in the password file (Conklin, White, Cothren, Williams, & Davis, 2004). Unfortunately, many of the deficiencies of password authentication systems arise from the limitations of human cognitive ability (Pond, Podd, Bunnell, & Henderson, 2000). The requirements to remember long and complicated passwords are contrary to a well-known property of human memory. First, the capacity of human memory in its capacity to remember a sequence of items is temporally limited, with a short-term capacity of around seven items plus or minus two (Kanaley, 2001). Second, when humans remember a sequence of items, those items cannot be drawn from an arbitrary and unfamiliar range, but must be familiar “chunks” such as words or familiar symbols. Third, the human memory thrives on redundancy. In fact, studies have shown that individuals’ short-term memory will retain a password for approximately 30 seconds, thereby requiring individuals to attempt to memorize their passwords immediately (Atkinson & Shiffrin, 1968).


1968 ◽  
Vol 27 (2) ◽  
pp. 575-582 ◽  
Author(s):  
Walter Sloboda ◽  
Edward E. Smith

Previous research has demonstrated that white noise disrupts human memory if it is administered with the to-be-remembered material. The present experiment investigated the effects of a 2-sec. burst of white noise on memory when it was administered during the retention interval (RI). Ss attempted to recall 7 digits after a 2- or 12-sec. RI. For the 2-sec. RI white noise was either present or absent. For the 12-sec. RI white noise occurred either during the first 2 sec., the middle 2 sec., the last 2 sec., or not at all. The results indicated that neither the temporal location nor even the presence of white noise had any effect on recall and that these negative findings could not be attributed to Ss filtering out the white noise at an autonomic or central level.


2006 ◽  
Vol 27 (3) ◽  
pp. 487-511 ◽  
Author(s):  
DEBORAH M. LITTLE ◽  
LAUREN M. McGRATH ◽  
KRISTEN J. PRENTICE ◽  
ARTHUR WINGFIELD

Traditional models of human memory have postulated the need for a brief phonological or verbatim representation of verbal input as a necessary gateway to a higher level conceptual representation of the input. Potter has argued that meaningful sentences may be encoded directly in a conceptual short-term memory (CSTM) running parallel in time to such a phonological store. The primary aim of the current study was to evaluate two main tenets of the CSTM model: that linguistic context biases selection of information entering the conceptual store, and that information not integrated into a coherent structure is rapidly forgotten. Results confirmed these predictions for spoken sentences heard by both young and older adults, supporting the generality of the model and suggesting that CSTM remains stable in normal aging.


Now a day’s privacy preservation is the big issue on growing big data in various field such as medical, engineering and physical with the fast growing network. One of the most important challenges in handling big data is security issues. To overcome such security issues cryptographic concepts have been used in this paper to provide high security of big data’s with the low consumption of time for both encryption and decryption process. In this paper the proposed method is Indexed RSA (IRSA) which is developed with modified scheme. We offered a method to index the keyword before encrypting the file and based on the indexed keyword the search has been done. Finally the security analysis was carried out and the analysis showed that our modified scheme can meet the security requirement against brute force attack and SQL injection attack.


The relation between neuropsychology and the study of normal cognitive function is discussed in the context of recent research on human memory. It is suggested that neuropsychological evidence has clear implications for the fractionation of human memory into subsystems. The distinction between long-term and short-term memory, between semantic and episodic memory, and the further fractionation of short-term or working memory all offer examples of concepts that have been successfully applied within the neuropsychological domain, and where the neuropsychological evidence has led to a modification and development of the original concept. Attempts to offer a cognitive interpretation of the amnesic syndrome are discussed. While none of these is entirely satisfactory, such work has led to a potentially important distinction between autobiographical memory or recollection, which is defective in amnesic patients, and a more perceptual or procedural learning process, which appears to be intact in such patients. Recent research on normal subjects is beginning to reveal a similar distinction. It is concluded that the relation between neuropsychology and the study of normal cognitive function continues to be an extremely fruitful one.


Nowadays in information security user authentication is a very important task. In most of the computer, user authentication depends on the alphanumeric username and password. It means text-based password. But, this is not highly secure because of hackers can easily break the password. Brute force attack, dictionary attack, guessing attack etc. these all are some possible attacks on the password. If the user chooses a difficult password to prevent the system from the attackers which is very much harder for the user to remember such a difficult password. So, to resolve this problem introduced a new technique called graphical password authentication. This paper presents a detailed survey of user authentication techniques using a graphical password. It contains basically two type approaches. They are recognition-based and recall-based approaches. This survey discusses the different techniques about Graphical password authentication and their advantages and limitations. The survey provides a roadmap for the development of new graphical authentication scheme.


1996 ◽  
Vol 82 (3) ◽  
pp. 769-770 ◽  
Author(s):  
Costanza Papagno

A specific component of human memory, the phonological short-term memory, plays a substantial role in the acquisition of new words. Both the short-term store and the rehearsal components of the system appear to be involved.


Author(s):  
Hikari Fujii ◽  
◽  
Nobuyuki Kurihara ◽  
Kazuo Yoshida ◽  

For autonomous mobile robots, visual information is used to recognize the environment. Although the acquisition of visual information is often disturbed in the real environment, it is necessary for a robot to act appropriately even if information is missing. We compensate for missing information for autonomous mobile robots by using short-term memory (STM) to make robots act appropriately. This method involves short-term memory and action selectors. Short-term memory is constructed based on the model of human memory and the forgetting curve used in cognitive science. These action selectors use compensated-for information and determine suitable action. One action selector consists of a neural network whose connection weights are learned by a genetic algorithm. Another selector is designed based on the designer's knowledge. These action selectors are switched based on reliability index of information. RoboCup Middle Size League soccer robots are used for demonstration. The experimental and simulation results show its effectiveness.


2013 ◽  
Vol 284-287 ◽  
pp. 3497-3501 ◽  
Author(s):  
Si Wan Kim ◽  
Hyun Yi Yi ◽  
Gun Il Ma ◽  
Jeong Hyun Yi

User authentication techniques such as the setting of passwords are gradually gaining importance as a means of managing important information stored in smartphones. Existing text–based password authentication schemes have the advantages of being quick and easy to use. However, they are problematic in that passwords are easily exposed to shoulder-surfing attack. In addition, a graphical password authentication scheme has the limitation of being difficult to apply to mobile device environments, in which a lot of information must be remembered and small-sized screens are provided. Therefore, in this paper, we propose a new hybrid password authentication scheme using a pocket billiard and a virtual joystick, which is secure against shoulder-surfing, brute force attack, and smudge attack and has excellent usability.


2016 ◽  
Vol 39 ◽  
Author(s):  
Mary C. Potter

AbstractRapid serial visual presentation (RSVP) of words or pictured scenes provides evidence for a large-capacity conceptual short-term memory (CSTM) that momentarily provides rich associated material from long-term memory, permitting rapid chunking (Potter 1993; 2009; 2012). In perception of scenes as well as language comprehension, we make use of knowledge that briefly exceeds the supposed limits of working memory.


Sign in / Sign up

Export Citation Format

Share Document