Loading

Negative Authentication and Password Secured Systems
Ali J. Askar1, Ammar A. Mahawish2, Mohammed Nasser Hussain Al-Turfi3

1Ali J. Askar, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
2Ammar A. Mahawish, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
3Mohammed Nasser Hussain Al-Turfi, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
Manuscript received on 25 June 2019 | Revised Manuscript received on 08 July 2019 | Manuscript Published on 17 July 2019 | PP: 229-236 | Volume-8 Issue-2S July 2019 | Retrieval Number: B10330782S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In nowadays, Software Applications has a significant role in each part of our life, this includes the health system, educational system, the industrial factories and even the nuclear plants. therefore, leaving the use of these Applications kind of an impossible to happen, regardless of the mounting risks that comes through cyber-attacks. In Software Applications the password considers as a gate key to the System, therefore attacking passwords is the first target for any cyber attacker. With all the new famous defenses System, there is no any authority that can set up an international law or a policy to guarantee the implementation of these systems, which lead the users to use a more complicated passwords to secure their systems, which it is not an efficient solution. In this Paper, the status of password systems will be presented as well as Implementation of the Negative Authentication.
Keywords: Cryptography, Cyber Security, Cipher, Web Applications, Negative Authentication.
Scope of the Article: Authentication, Authorization, Accounting