Wednesday, April 28, 2010

Password in online banking

A password is a secret word or string of characters that is used for

authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password must be kept secret from those not allowed access.

The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword. Sentries would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, m

obile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web

sites, and even reading the morning newspaper online.

Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words may be harder to guess, a desirable property. Some passwords are formed from multiple words and may more accurately be called a passphrase. The term passcode is sometimes used when the secret information is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be easily memorized and typed.

For the purposes of more compellingly authenticating the identity of one computing device to another, passwords have significant disadvantages (they may be stolen, spoofed, forgotten, etc.) over authentications systems relying on cryptographic protocols, which are more difficult to circumvent.

Contents

  • 1 Easy to remember, hard to guess
  • 2 Factors in the security of a password system
    • 2.1 Rate at which an attacker can try guessed passwords
    • 2.2 Form of stored passwords
    • 2.3 Methods of verifying a password over a network
      • 2.3.1 Simple transmission of the password
      • 2.3.2 Transmission through encrypted channels
      • 2.3.3 Hash-based challenge-response methods
      • 2.3.4 Zero-knowledge password proofs
    • 2.4 Procedures for changing passwords
    • 2.5 Password longevity
    • 2.6 Number of users per password
    • 2.7 Design of the protected software
  • 3 Password cracking
    • 3.1 1998 incident
  • 4 Alternatives to passwords for access control
  • 5 Website password systems
  • 6 History of passwords
  • 7 See also
  • 8 References
  • 9 External links

No comments:

Post a Comment