Ultimate password: is voice the best biometric to beat hackers?

Author:

Vittori Piergiorgio1

Affiliation:

1. Spitch

Abstract

Citrix, a company that works with the likes of the FBI and US military, recently hit the headlines when it fell victim to hackers 1 . The cyber-criminals allegedly stole terabytes of sensitive documents including reports, blueprints and business papers, using a technique called password spraying. This approach, which exploits weak passwords, could be used to infiltrate many more companies like Citrix – and it's one more example of why the traditional username and password combination is no longer fit for purpose, in both our personal and business lives.

Publisher

Mark Allen Group

Subject

Electrical and Electronic Engineering,General Computer Science

Reference5 articles.

1. Amit Rahav. ‘Password Spraying Fells Citrix. Are We Next?’. 29 May 2019. InfoSecurity Magazine. https://www.infosecurity-magazine.com/opinions/password-spraying-citrix-1/. Accessed September 2019.

2. Clarisse Loughrey. ‘Minority Report: 6 predictions that came true, 15 years on’. 25 June 2017. The Independent. https://www.independent.co.uk/arts-entertainment/films/features/minority-report-15th-anniversary-predictive-policing-gesture-based-computing-facial-and-optical-a7807666.html. Accessed September 2019.

3. Nicole Kobie. ‘The complicated truth about China's social credit system’. 7 June 2019. Wired. https://www.wired.co.uk/article/china-social-credit-system-explained. Accessed September 2019.

4. ‘How to fake a fingerprint and break into a phone’. 2 May 2016. The Verge. https://www.youtube.com/watch?v=tj2Ty7WkGqk. Accessed September 2019.

5. Rita L Sallam, Cindi Howson, Carlie J Idoine, Thomas W Oestreich, James Laurence Richardson, Joao Tapadinhas. ‘Magic Quadrant for Business Intelligence and Analytics Platforms’. 16 February 2017. Gartner. https://cdn2.hubspot.net/hubfs/2172371/Q12017Gartner.pdf?t=1496260626075. Accessed September 2019.

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An Enhanced Database Security System using Dynamic Time-Warping Voice Recognition Technique;International Journal of Advanced Research in Science, Communication and Technology;2024-05-30

2. Traditional Authentication;SpringerBriefs in Computer Science;2023-10-29

3. Privacy and biometrics for smart healthcare systems: attacks, and techniques;Information Security Journal: A Global Perspective;2023-10-03

4. IrisIndexNet: Indexing on Iris Databases for Faster Identification;5th Joint International Conference on Data Science & Management of Data (9th ACM IKDD CODS and 27th COMAD);2022-01-08

5. The internet of things security: A survey encompassing unexplored areas and new insights;Computers & Security;2022-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3