Cyber Security Expo
Graphical Passwords by Todd Exum on 09/05/07

Information security personnel are capable of describing the problems that can occur because of a hacked password, weak passwords, or even poor password management could do to a business. It is these things that you, as information security, are required to protect, even if the everyday user does not know how to. How many times do you think someone from within an organization has given a coworker a password so that they can gain access to a particular file or program, regardless of how harmless it may seem? It happens, and there is nothing we can do about poor password maintenance from a user. Yet, there are other ways in which to gain access to secure systems. These methods include the use of software that logs keystrokes and the “brute force” method. Key logging software records all the keystrokes input from the keyboard and stores it for the hacker to look through and find what could be a password. In the case of a brute force attack, the software uses all possible combinations a user could use for a password, until the hacker gains access. Therefore, this work will discuss the benefits and ways in which graphical passwords can be used in the business place, to ensure that computer systems are secure.

What if there was a way that we could protect your clients’ information, as well as your own, without having to remember difficult passwords or having to write them down where an unauthorized user could gain access? The answer to that question could be in the form of graphical passwords. A few professors at Rutgers University (Birget, et al) started what is known as the Graphical Password Project.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.