Free Essay

A Study of Captcha for Web Security

In:

Submitted By chicati
Words 2733
Pages 11
A Study of CAPTCHA for Web Security

Abstract— As the increase of Internet usage in term of available services provided, user gains more convenience but also face a challenge. Online services such as Email, search engine, social networking may be abused by the automated program or web bots. To ensure the service is used by human, most of them use Completely Automated Public Turing test to tell Computers and Human Apart (CAPTCHA) methods to securing their web services. This paper will discuss the various types of CAPTCHAs and issues in designing the good CAPTCHA in term of security and usability. Keywords: CAPTCHA, TEXT-Based, GRAPHIC-Based, AUDIOBased, Robustness, Usability

Online Polls: Result of any online poll can only be trusted if the poll system ensures that only humans can vote. Preventing Dictionary Attacks: CAPTCHAs can also be used to prevent dictionary attacks in password systems. Search Engine Bots: Configuring the website as nonindexed page is important to prevent others from finding them easily. This is why CAPTCHA is important Worms and Spam: CAPTCHAs also offer a reasonable solution against email worms and spam which only accept if the sender is a human [2].





I.

INTRODUCTION



A CAPTCHA which is stand for Completely Automated Public Turing test to tell Computers and Human Apart is a challenge response test which gives a challenge to the users. It is one of Human Interaction Proofs. When the user gives accurate answer he is considered as human otherwise a web bot. Web bots are scripts or applications designed to perform predefined functions repeatedly and automatically after being triggered intentionally or through a system infection [1]. It is important to differentiate between a human and a machine in the fields of Artificial Intelligent, Internet Security and human computer interaction [3].Some web services and applications that use CAPTCHA as a defensive mechanism against automated web bots are [2]:  Preventing Comment Spam in Blogs: By using a CAPTCHA, only humans can enter comments on a blog without necessary to sign up before they enter a comment.  Protecting Website Registration: A few years ago email services provider such as Google, Yahoo, etc. were suffered from a "bots" that would sign up for thousands of email accounts every minute. By using CAPTCHA, it would ensure that only humans can obtain free accounts. Protecting Email Addresses from Spammers: CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address.

However, it give some disadvantages to user experience since CAPTCHAs increase load on servers because of requirement for image database and huge server processing. Eventually it results in delay of Web page downloads and their subsequent refreshes [5]. Besides that, some types of CAPTCHAs pose an unfriendliness, accessibility problem and annoyance to legitimate user. A good CAPTCHA minimizes these disadvantages by generating a CAPTCHA test that satisfies its various desired properties. These properties include [3, 5]:  It should be easy for human users to pass.  It should be easy for a tester machine to generate and grade.  It should be accept and suitable to all humans and disabled person  It should be hard for a software robot to pass II. TYPES OF CAPTCHA METHODS



A. TEXT-Based CAPTCHA Text CAPTCHAs are almost exclusively used in real applications since it is easy to implement and effective. In Text-based CAPTCHAs simple questions are asked [3]. Examples of such questions are [2]:  How many days in January?  What is the third letter in MALAYSIA?  If yesterday was a Sunday, what is today?

1|P age

ITT730: Norliyati Rohman (2012721487)

Such questions are very easy for a human user to solve, but it’s very difficult to program a computer to solve them. Other text CAPTCHAs involves text distortions and the user is asked to identify the text hidden. The various implementations are [2, 4]:  Gimpy: is a very reliable text CAPTCHA. It works by choosing ten words randomly from a dictionary and displaying in a distorted and overlapped manner.  Ez-Gimpy: is a simplified version of the Gimpy. It randomly picks random alphabets from a dictionary to create nonsense but pronounceable text then applies distortion to the text. MSN CAPTCHA: It is created for Microsoft which uses eight upper case character and digits. Warping is used to distort the character, to produce a ripple effect which makes computer recognition difficult.

B. GRAPHIC-Based CAPTCHA Graphics-based CAPTCHA present a visual pattern or concept that the user needs to identify an act accordingly. Different graphic-based CAPTCHA scheme use different concepts which are easy to be recognized by the users and difficult for the bot programs to stimulate. It also acts as challenge-tests in which the users have to guess those images that have some similarity like visual puzzle [3]. Examples of Graphic-based CAPTCHAs are:  Image Orientation CAPTCHA: Developed by Google and requires users to adjust randomly rotated images to their upright orientation [4].





Bongo: User has to solve visual pattern recognition which must find the characteristic that set two different series of blocks apart.



Pix: is a program that has a large database of labeled images. The program picks an object at random, present the six mages to user then ask the question “What are these images of?”

Gimpy CAPTCHA Pix CAPTCHA

reCAPTCHA Bongo CAPTCHA

MSN CAPTCHA

Image with various orientation properties Ez-Gimpy CAPTCHA

Figure 1: Samples of TEXT-Based CAPTCHA

Figure 2: Samples of GRAPHIC-Based CAPTCHA

2|P age

ITT730: Norliyati Rohman (2012721487)

C. AUDIO-Based CAPTCHA Audio-Based CAPTCHAs are based on the sound-based systems. These CAPTCHAs are alternatively developed for visually disabled users. It contains downloadable audio-clips [3]. Other program of audio-based CAPTCHA use to picks a word or a sequence of numbers at random, renders the word or the numbers into a sound clip and distorts the sound clip; it then presents the distorted sound clip to the user and asks users to enter its contents. [2].Audio CAPTCHAs are more difficult to solve, hard to internationalize and more demanding in terms of time and efforts in comparison with text and image CAPTCHAs [1].

individual segments, mapping of segments to characters and use of dictionary to guess the correct word [5]. However, it’s hard to break all CAPTCHA test with a single type of segmentation algorithm. One of image segmentation explained by M.Tariq Banday and Nisar A.Shah is Content-Based Image Retrieval (CBIR) methods which can be used for segmentation of image in regions, identification of region of interest and extract the semantic content. The process involves use of edge detection to segment an image into region which each contains a single character [1]. 2) Character Recognition After segmenting the image into letter, it would be passed to character recognition step. Character recognition may involve use of dictionary to facilitate the character recognition process in identifying the candidate text string [5].

Figure 3: Sample of AUDIO-Based CAPTCHA D. Other CAPTCHAs Beside above types of CAPTCHA tests, some technique are used a Video-Based, Implicit CATCHA challenge, etc. Video based using animation or video in which user must give three word to describe the presentation of video [4]. However this scheme is more complex and consumes more bandwidth compare to the others. Implicit CAPTCHA proposes single click challenges distinguished as necessary browsing links which can be answered through experience of the context of the particular website [5]. III. ISSUES IN DESIGNING CAPTCHA

Newly designed CAPTCHAs use the methods of font tricks, choice of letters, noise, color model, overlap, distortion and degradation [5]. To strengthen the various CAPTCHA techniques, some researcher has proposed and designed new techniques. Shirali-Shahreja and M.H have been proposed Multilingual CAPTCHAs which user can select his/her native language then it would be translated using online translator. Besides multilingual process, user have to recognize and finding the object. Both operations cannot be done by computer appropriately, so this method can resist the computerized attacks efficiently. [3] TIME-VARIENT CAPTCHA which has been introduced by Yadava P, Sahu C and Shukla S is focused on targeting a display of CAPTCHA on the webpage for a fixed time. It will keep changes and replaces itself until the last CAPTCHA is filled by user. The automated program has to breach one more step to determine the final entered CAPTHA [3]. 3D-Dynamic CAPTCHA which has been proposed in [2] is believed a technique that difficult to crack but easy for humans to recognize them. The idea is integrating the character layer, background interference layer and foreground interference layer as one set of CAPTCHA. In character layer the attribute of character is defined in term of number of character, size, font, color, spin, twist, etc. For background layer it can include not only background color transformation, 2D static image, but also light, smoke and texture rendering and others. Foreground interference is involves character, line and point interference. In the point of security view, this new design can prevent attacks efficiently from existing algorithms as well as possible ones using multiple frames. Furthermore, transformation from 2D to 3D optimizes the visual effects, providing a new idea for the design of CAPTCHA [2]. Move-Select CAPTCHA algorithm also is one of good idea to increase the complexity of CAPTCHA on preventing

There are two major issues involved in designing a strong CAPTCHA test [4]: Robustness and Usability (human friendly) A. Robustness Developer should design the CAPTCHA based on the robustness factor to ensure the difficulty to break the test. Breaking a CAPTCHA challenge is difficult and it is very rare to find 100% success rate, however several CAPTCHA implementations have been broken and thus are proved to be inefficient [5]. Breaking a CAPTCHA means to solve a CAPTCHA challenge by writing malicious computer software. There are two step processes which mainly used to defeating the CAPTCHA technique: 1) Segmentation Segmentation can be a process of segmenting text, image and audio. The emergence of this technology make a lots of website been attacked. A simple breaking procedure of text based CAPTCHAs involve segmentation of text string into

3|P age

ITT730: Norliyati Rohman (2012721487)

various techniques to be attacked. In this paper [4] they propose a 2-layer CAPTCHA test, based on human cognitive psychology to secure web services. In first layer users need to move and place the exact block of image to make a full meaningful image from the set of images rearranged randomly. Since computer program cannot perform mouse actions as normal human it is increase difficulties to pass the test. For the second layer, user need to select events associated with image from the drop-down list to avoid miss spelling of users and improve security. These two mechanism of move and select CAPTCHA can avoid the bots to control the system. Given facts that most of designers and researchers are aware on the robustness of CAPTCHAs and increasing complexity, sometimes it become extremely difficult to identify. B. Usability Usability is concerned with making CAPTCHA tests easy to learn, use, understand and interpret. It has become difficult for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for humans too [4]. High accuracy, low response time and low perceived difficultly are desired to make CAPTCHAs usable and user friendly. Accuracy is a measure of correctness with which users can respond to a CAPTCHA challenge without making mistakes. Response time is the time taken by a user to react to the CAPTCHA challenge. Perceived difficulty is the difficulty observed by the users in solving CAPTCHA challenges [5] Distortion is important in CAPTCHA to enhance the security control. However the use of excessive distortion level and methods may not only make CAPTCHAs unusable but also will reduce its security control because the system would have to allow multiple attempts for failed tests. Inappropriate or unorganized CAPTCHA or any unsolicited or offensive image or text appearing in the CAPTCHA content will considerably reduce its usability [5]. To improve the presentation of a CAPTCHA test various usability issues that must be addressed while designing a CAPTCHA challenge, are use of color, user interface and appropriate screen area so as to make the challenge simple, easy to answer, easy to integrate with the Web page and highly accurate. It is highly recommended to carry out usability tests of a CAPTCHA method against humans to ascertain its usability. The tests should analyze accuracy, response time and user satisfaction on different image sizes with different distortion levels [5]. Below are some examples of researches that focus on improving the current CAPTCHA usability: 1) Text-Based Richard Chow has proposed a generic technique for converting a textual CAPTCHA into a clickable CAPTCHA

with an aim of improving usability of text-based CAPTCHAs. It proposes placement of multiple text CAPTCHA images in a grid among which some are English words while others are not. The user must click on all valid English words to pass this CAPTCHA test 2) Image-Based The excessive of distortion levels for each sub-image may be automatically controlled by keeping track of images that genuine users have failed to recognize. To improve usability of image-based CAPTCHAs, the test should use the wellknown images which can be recognized easily by most of the users. It also will improve user friendliness and speedsup the entry of the CAPTCHA by having clickable interface. This technique is not only suitable on computer, but on devices with small displays such as in smart phone, tablets computer or portable devices [5]. A new clickable image-based CAPTCHA that proposed by M.Tariq Banday and Nisar A in [1] is called Image Flip CAPTCHA. The researchers analyzed its usability issues under distortion, content and presentation dimension. In this proposed technique, user has only identify its place and recognize any flip in it rather than understand the image fully. It shows that the visibility of distortion does not affect a user to make the correct response. This technique also uses small-sized images which result in a compact image database, thus reduce the retrieval time. In the presentation view, the Image Flip CAPTCHA use a clickable approaches which give the best experience to user in term of user friendliness and fast response. Based on the analysis, this technique presents a high success rate and effective usability. 3) Audio-Based Nowadays, the improvement of CAPTCHA methods in usability manner like audio CAPTCHA along with text or image based CAPTCHA has become an alternative for visually disabled people to gain access to the protected Web resource [5]. Besides, in order to make the Web accessible to people with disabilities, the developer should refer to the guidelines that have been provided by W3C Web Accessibility Initiative (WAI). IV. CONCLUSION

The most popular CAPTCHA method that widely implemented in major website is Text-Based CAPTCHA. It is easy to deploy beside can provide strong security if properly designed. Graphic-Based CAPTCHA and Audio-Based CHAPTCHA methods have been proposed as an alternative to text-based. However, the process of creating image or audio database and the storage requirement sometimes can cause a delay operation in term of processing the presentation. The proposed techniques that were introduced by exist researchers which can satisfies user need in security control against bots, usability, and friendliness can be implemented in future.

4|P age

ITT730: Norliyati Rohman (2012721487)

V.
[1]

REFERENCES

[3] [4]

[2]

M.Tariq Banday and Nisar A.Shah, “Image Flip CAPTCHA,” The ISC International Journal of Information Security. July 2009, Volume 1, Number 2 (pp. 105-123) Ramesh Babu .A, Praveen Kumar .K and Dr.Srinivasa Rao .V, “Implementation of Secure Multilayered CAPTCHA”, International Journal of Advanced Engineering Sciences and Technologies. Vol No. 6, Issue No. 2, 200 - 219

[5]

Baljit Singh Saini and Anju Bala, “A Review of Bot Protection using CAPTCHA for Web Security”, Volume 8, Issue 6 (Jan. - Feb. 2013) Moin Mahmud Tanvee, Mir Tafseer Nayeem and Md. Mahmudul Hasan Rafee, “Move & Select: 2-Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services”, International Journal of Video & Image Processing and Network Security. Vol: 11 No: 05 M. Tariq Banday and N. A. Shah, “A Study of CAPTCHAs for Securing Web Services”, IJSDIA International Journal of Secure Digital Information Age, Vol. 1. No. 2, December 2009

5|P age

Similar Documents

Free Essay

3d Animation Captcha

...A CAPTCHA Implementation Based on 3D Animation Abstract—In order to distinguish between human users and computer programs, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism is widely applied in websites such as accounts application website. While the major implementation of CAPTCHA method—2D still image verification code based on OCR technology is threatened by developing artificial intelligence and image recognition technologies. In this paper, we propose a new approach to implement CAPTCHA mechanism based on 3D Animation, utilizing the weakness of computer vision, which make it robust to computer attacks and convenient for users to recognize, and implemented this method to generate a 3D animation verification code. Keywords-CAPTCHA;VerificationCode;Moving Three-dimensional Animation I. Figure 1. objects; INTRODUCTION Internet is crucial to each respect of life all over the globe nowadays, through which we could retrieve and exchange information freely and efficiently. Given the fundamental relation between internet and people’ s life, vast malicious computer programs attack websites for profits, such as auto application for some mails’ accounts to send junk e-mails, etc. CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) system emerges to solve this problem by identifying end-users of internet whether a real person or an automated computer program[1][2][3]...

Words: 3406 - Pages: 14

Premium Essay

Electronic Voting System

...System with Paillier Threshold Cryptosystem Web Services Version 1.00 A project submitted to the Faculty of Graduate School, University of Colorado at Colorado Springs in Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Software Engineering Department of Computer Science Prepared by Hakan Evecek CS701 Dr. Chow Spring 2007 This project for the Masters of Engineering in Software Engineer degree by Hakan Evecek has been approved for the Department of Computer Science By _______________________________________________________ Dr. C. Edward Chow, Chair _______________________________________________________ Dr. Richard Weiner _______________________________________________________ Dr. Xiaobo Zhou Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold Crytosystem Web Services Architecture and Design 17 4. Online...

Words: 7163 - Pages: 29

Free Essay

Digital Forensics - Uganda’s Preparedness

...Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented to the recognition, identification...

Words: 7291 - Pages: 30

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Free Essay

Tjmax

...Barbarians at the Gateway (and just about everywhere else): A Brief Managerial Introduction to Information Security Issues1 a gallaugher.com case provided free to faculty & students for non-commercial use © Copyright 1997-2009, John M. Gallaugher, Ph.D. – for more info see: http://www.gallaugher.com/chapters.html
 Draft version last modified: Dec. 7 , 2009 – comments welcome john.gallaugher@bc.edu
 Note: this is an earlier version of the chapter. All chapters updated Dec. 2009 are now hosted (and still free) at http://www.flatworldknowledge.com. For details see the ‘Courseware’ section of http://gallaugher.com 
 INTRODUCTION  
 LEARNING
OBJECTIVES:
 After
studying
this
section
you
should
be
able
to:

 1. Recognize
that
information
security
breaches
are
on
the
rise.
 2. Understand
the
potentially
damaging
impact
of
security
breaches.
 3. Recognize
that
information
security
must
be
made
a
top
organizational
priority.
 
 Sitting
in
the
parking
lot
of
a
Minneapolis
Marshalls,
a
hacker
armed
with
a
laptop
and
a
 telescope‐shaped
antenna
infiltrated
the
store’s
network
via
an
insecure
Wi‐Fi
base
station.

 The
attack
launched
what
would
become
a
billion‐dollar
plus
nightmare
scenario
for
TJX,
 the
parent
of
retail
chains
that
include
Marshalls,
Home
Goods,
and
T.J.
Maxx.
Over
a
period
 of
several
months,
the
hacker
and
his
gang
stole
at
least
45.7
million
credit
and
debit
card
 numbers,
and
pilfered
driver’s
license
and
other
private
information
from
an
additional
 ...

Words: 15885 - Pages: 64

Free Essay

Botnet Analysis and Detection

...Acknowledgements I would like to appreciate God Almighty for his faithfulness and for the strength, without him I am nothing. I would like to thank my supervisor Dr Hatem Ahriz for his guidance throughout the writing of this report. I would like to thank Richboy and Ete Akumagba for their guidance and for proof reading this report. I would like to thank my family for their support and love. ii Abstract This era of explosive usage of networks have seen the rise of several opportunities and possibilities in the IT sector. Unfortunately, cybercrime is also on the rise with several forms of attack including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ................

Words: 13171 - Pages: 53

Premium Essay

Ethical Hacking

...paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime, a study showing that nearly 90% of attacks happen on the inside [1] raising concerns of how easy it is to be working on the inside to be able to infiltrate attacks. Has ethical hacking finally come to the rescue for solving the problems or has it created new ones? 2. DISCUSSION A. Education and training The problem of teaching students to hack is still a very serious issue...

Words: 3974 - Pages: 16

Free Essay

Marriage and Commercialism

...Marriage and Commercialism News ------------------------------------------------- Top of Form Bottom of Form * ------------------------------------------------- Home * ------------------------------------------------- News * ------------------------------------------------- Features * ------------------------------------------------- Network * ------------------------------------------------- Events * ------------------------------------------------- Education * ------------------------------------------------- Cities * ------------------------------------------------- Job Board * ------------------------------------------------- Life * ------------------------------------------------- Awards * ------------------------------------------------- More * -------------------------------------------------   General  |  Technology  |  Enterprise   |  Startups  |  Finance  |  Business  |  Career  |  Movie reviews   |  Life   |  US Indian  |  Gadgets Most Popular ( 1-4 of 16 ) Indian American Tribute to Rajesh Khanna 10 Tips for Newly Salaried Professionals Brand-New Dual Core Smartphones in India Celebrity Wives And Their Businesses Marriages fit for kings - for Sahara tycoon's sons Monday, 09 February 2004, 12:30 IST inShare | | Print | | Email | Lucknow, Over 10,000 guests, an orchestra from London and an award-winning filmmaker as videographer are some of the dazzling highlights of...

Words: 3616 - Pages: 15

Premium Essay

Hacking

...explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime, a study showing that nearly 90% of attacks happen on the inside [1] raising concerns of how easy it is to be working on the inside to be able to infiltrate attacks. Has ethical hacking finally come to the rescue for solving the problems or has it created new ones? 2. DISCUSSION A. Education and training The problem of teaching students to hack is still...

Words: 3982 - Pages: 16

Premium Essay

It and Its Scope

...Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state that, each Board of studies has adhered to the resolutions passed by Faculty of Technology, and developed curriculum accordingly. In addition to outcome based education, semester based credit and grading system is also introduced to ensure quality of engineering education. Semester based Credit and Grading system enables a much-required shift in focus from teacher-centric to learner-centric...

Words: 10444 - Pages: 42

Premium Essay

Information Technology

...technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two years earlier. The National Aeronautics...

Words: 25389 - Pages: 102

Premium Essay

Exceptional Services

...March 25, 2011 Exceptional Service, Exceptional Profit The Secrets of Building a Five-Star Customer Service Organization Leonardo Inghilleri and Micah Solomon ©2010 Leonardo Inghilleri and Micah Solomon Adapted by permission of AMACOM, a division of The American Management Association ISBN: 978-0-8144-1538-2 Introduction The key to a successful business is customer loyalty. Building enduring business relationships is a timeless strategy that transcends factors that are out of a service organization’s control, including technological changes, economies of scale, and exchange rates. Solid customer loyalty serves as insurance against the risks of a commodity being viewed as replaceable or interchangeable. In Exceptional Service, Exceptional Profit, Leonardo Inghilleri and Micah Solomon share a variety of techniques pioneered by the Ritz-Carlton hotel chain, Netflix movie rental service, and other companies that have earned a loyal customer base. From mastering the four elements of customer satisfaction to handling service failures to personalizing the online experience, organizations can make the shift from reactive to anticipatory service and build a base of clients that will keep coming back for more. Satisfaction Guaranteed Inghilleri and Solomon consider customer satisfaction a prerequisite to establishing loyalty. Although satisfied customers are still at risk of being wooed away by a competitor, they will believe a business offers a reasonable product or service...

Words: 5083 - Pages: 21

Free Essay

Usability and Security

...Running Head: USABLE SECURITY THE IMPLEMENTATION Usable Security the Implementation Name Institution Abstract This project was about usability security and its implementation. It involved the designing and development of a suitable human computer interface to provide a log on module for the Kuwait armed forces computer system. The development focused on relieving the user from the load of creating, remembering and maintaining their passwords for the login process. Based on the fact that the Kuwait information and communication technology literacy levels are still in their infancy stage, the conventional authentication system was proved unfriendly to the user. This system was developed with this in mind. This proposed system relies on the user logging in to the system after identifying five pictures they uploaded earlier from among a grid of twenty five pictures. By selecting the five correct pictures which they uploaded, the system was able to successfully authenticate the user. Using these pictures greatly reduced the mental load on a user who was required to remember strong passwords that ended up being compromised (Badre 2002). The use of pictures or graphical images for authentication or access control is a practice called biometrics that is gaining popularity in establishing system security today. Due to the need to deliver a solution in the shortest time possible the...

Words: 17373 - Pages: 70

Premium Essay

Information Systems in Organizations Test Bank

...Information Systems in Organizations (Wallace) Chapter 1 Information Systems and People 1) China is known as the world's "back office" because innumerable companies in China manage information system applications for a growing number of multinational corporations. Answer: FALSE Page Ref: 6 AACSB: Use of information technology Chapter LO: 1 Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes 2) A survey of retailers found that modern point-of-sale technology was rated the least valuable element in customer satisfaction. Answer: FALSE Page Ref: 8 AACSB: Use of information technology Chapter LO: 1 Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems 3) A person's online behavior is an important source of business intelligence. Answer: TRUE Page Ref: 9 AACSB: Use of information technology Chapter LO: 1 Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making 4) The information systems that support virtual teamwork and collaboration are, in some respects, still in their infancy compared to the more mature operational systems. Answer: TRUE Page Ref: 9 AACSB: Use of information technology Chapter LO: 1 Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork 5) The development and application of innovative information systems improve the operations...

Words: 8842 - Pages: 36

Premium Essay

Ethics

...Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Microsoft, Windows 95, Windows 98, Windows 2000,...

Words: 204343 - Pages: 818