Security Plays A Vital Role In The Organizations Such As IT Industries: Cyber Security Thesis, NCI, Ireland
University | National College of Ireland (NCI) |
Subject | Cybersecurity |
Abstract
In today’s world, security plays a vital role in the organizations such as IT industries, Banking, Education sectors, etc. User authentication is an essential part of a user’s security. It gives assurance to the user to maintain their Confidentiality, Availability, and Integrity of the information. Nowadays, user authentication faces significant challenges for users’ data to keep data secure from unauthorized people. Because of this threat, some new authentication mechanisms are needed. So, in this research, multi authentication mechanisms for user authentication are used. The main motive of this report is to present an overview of the project.
This project aims to implement multi authentication for login security. It includes voice-based authentication, color mapping with grid, OTP, and the Fibonacci series concept. Use of all areas as mentioned above for user security purposes and preventing the shoulder suffering attack. Color mapping is used for the first authentication, and the user has to put that color into the 6X6 grid. In the second authentication, the One-time Password is used with the Fibonacci series algorithm, and the third is voice-based recognition authentication will be performed. A profound description of every security module will explain in the following sections.
Are You Searching Answer of this Question? Request Ireland Writers to Write a plagiarism Free Copy for You.
Introduction
In today’s world, user authentication is the primary security concern. In every type of organization, Authentication is an essential factor. It is a technique where user-sensitive data or accounts get secured from unauthorized people. Protecting the user’s data from getting a leak, such attacks can be prevented by security techniques. In the market, multiple mechanisms are providing secure Authentication to the users to keep their accounts secured. Every security technique has its unique pattern about user authentication—for example, FIDO, Biometric, Color mapping, Voice-based, Image detection, etc.
Currently, a large number of accounts get accessed and got misused. The user has to face lots of challenges after the attack happens. To prevent these problems, this research is carried out. This project will carry out as thinking of the users, the combination of the multiple security factors will prevent the cyber-attacks?
Get Solution of this Assessment. Hire Experts to solve this assignment for you Before Deadline.
Motivation
User authentication is the central pillar of the Organizations. And security is the more essential concern for all types of industries. This project aims to provide secure user authentication and perfect logging because attackers can guess passwords easily, get into the victim’s computers, and perform illegal activities. As the output, the user has to face many issues like data losses and lack of integrity. Considering these issues, this project proposed multi-level Authentication in less time.
Considering these issues, it clicks the two questions, “How the multi-level authentication can prevent the shoulder suffering attack” and “How effective is this user authentication? “. Sometimes users are not familiar with the securities concerns like keeping the account open, making a small password, input the password in public. It makes it attackers easily to gain their accounts or the systems. Therefore, Aim of this project is to present secure multi-level
user authentication.
The report is divided into sections. Section 1 contains the introduction of the project. It gives a detailed description and motivation of the proposed system. Section 2 contains the literature review in which provides detailed information on the previous year’s research papers during this research. Section 3 gives the information about the research methodology, and it provides every single step detail of the methods and the model of the system. Section 4 contains the conclusion. Section 5 provides references taken during the research.
Stuck in Completing this Assignment and feeling stressed ? Take our Private Writing Services
It is currently fairly simple to obtain thesis writing assistance in the field of cybersecurity. For Ireland students, we offer a straightforward purchase approach that allows them to quickly acquire our high-quality Cybersecurity thesis help services. This work in our Dublin assignment assistance contains a cybersecurity breach. You may contact us at any moment for low-cost IT assignment assistance.