The use of graphical passwords, adds more operations to the information systems to deal with the images used and the determination of the selected region by the users or to manage and record the steps that the user performed to choose the correct sequence of the specified. The user selects points or regions in the image, determines specific shape or arranges the displayed shapes (see figure 2). This password includes the use of images or shapes to determine the user's password. Traditional textual passwords are applied in information systems due to ease of use and remember, but some researchers tried another direction by proposing graphical password techniques as an alternative to textual password methods. Based on the type of the password, the user password authentication schemes are classified into: textual passwords and graphical passwords. (2) Recording attacks, which the authentication password has been recorded by a camera device for later analysis. The shoulder surfing attack is categorized into two classes: (1) Direct observation attack, which authentication password is determined by an adversary who is directly monitoring the login interface. The key challenge is to protect user's password from being stolen by shoulder surfing attackers. All that in order to give the user adequate level of security against the shoulder surfing. Furthermore, companies that produced ATMs are constantly trying to redesign the keypad in a new form or add more tools (ATM keypad protector as walls that surround the keypad). One of the threats facing the user while using an ATM, especially when entering the password is the shoulder surfing. This keypad adds more cost to the total cost of production of these machines. the Automated Teller Machines (ATMs) are usually designed to include a keypad that is mainly used to enter the password of the card (see figure 1).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |