Explore chapters and articles related to this topic
A Taxonomy of Bitcoin Security Issues and Defense Mechanisms
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
While in some countries use of bitcoins is free and legal, in some others, it is a banned currency. If we talk about India, then although not illegal, it is not one of the regularised currencies because of which, users refrain from making transactions using bitcoins. For the transactions to take place from a bitcoin wallet, user authorization is required. Figure 10 shows different authentication methods by which the bitcoin-owner approves of the financial transaction. Each one of them can be used independently as well as in combination with one another. When used independently, then it is called ‘single-factor authorization’. When a combination of two techniques, like login id password and one-time password, are needed to approve a transaction, then it is called ‘two-factor authentication’. Similarly, when more than two factors are required, then it becomes multi-level authentication [57].
Determinants Related to Threats in Information and Informatics Systems
Published in Anna Brzozowska, Dagmara Bubel, Larysa Nekrasenko, Organisation Management in the Digital Economy, 2022
Anna Brzozowska, Dagmara Bubel, Larysa Nekrasenko
The problem of inappropriate rules of handling access passwords is the simplest and most popular example, which is worth mentioning in the context of security of informatics systems. Access passwords serve the purpose of protecting information against unauthorised access. Numeric passwords and codes are often the only method used for safeguarding actions performed by users of ICT systems. Since easy-to-guess passwords, often based on dictionary vocabulary, are frequently a cause of data leaks, they are verified at the very beginning of penetration tests which are designed to simulate attacks performed by online intruders.
Cyber Security Techniques Management
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Meenu Shukla, Fatima Ziya, Sharmila Arun, Suraj Pal Singh
A bruteforce password breach can take advantage of information that people provide on social media accounts. Passwords are sometimes formed using the individual's hobbies, particular hobbies, pet's name, and child's name, making them reasonably easy to guess for the attack. A dictionary attack can also be used by the attackers to figure out the password of the user. The dictionary attack is the method of guessing a target's password by using commonly used words and phrases, similarly the ones found in a dictionary.
Rain Drop Service and Biometric Verification Based Blockchain Technology for Securing the Bank Transactions from Cyber Crimes Using Weighted Fair Blockchain (WFB) Algorithm
Published in Cybernetics and Systems, 2023
A Goel (2016) focused on the technical factors of numerous kinds of cybercrimes regarding the financial sectors and their associated influences. Additionally, it identifies the threat vectors helping those cyber-crimes and broadens measures to aid in fighting the ensuing cyber-attacks so that such attacks may be significantly averted for more robust security. Tounekti, Ruiz-Martinez, and Skarmeta Gomez (2020) present practical guidelines for supporting payment techniques with Web browsers and the World Wide Web Consortium (W3C) API. The person ought to change the password every three months. However, banks are accountable for ensuring that the user converts to a strong password Dhatchina Moorthy (2020). The bank must use the idea of a trusted device to provide the user’s identity while logging on. Banks have delivered a multilayer technique for online banking login below a new approach of strong customer authentication (SCA). RDS verification is done without any centralized authority and this process can be verified only by the user responsible for a particular transaction.
Towards Digital Forensics Investigation of WordPress Applications Running Over Kubernetes
Published in IETE Journal of Research, 2023
Muhammad Faraz Hyder, Syeda Hafsa Ahmed, Mustafa Latif, Kehkashan Aslam, Ata. U. Rab, Mussab T. Siddiqui
A dictionary attack is a kind of brute-force attack on a password-protected system. The attacker attempts to access the system by systematically entering every word in a dictionary as a password. Weak passwords such as successive numbers, symbols, or letters make dictionary attacks easier to execute. A dictionary attack uses a list of words and phrases to figure out conceivable passwords. Such passwords are more often than not gotten from information spills and online assets.