A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Gururaj, H. L.
- Computer Locking Using Bluetooth Device Proximity
Authors
1 Vidyavardhaka College of Engineering, Mysuru, IN
Source
Biometrics and Bioinformatics, Vol 10, No 5 (2018), Pagination: 99-103Abstract
Providing computer security using Bluetooth is a new type of security system where in a registered Bluetooth device itself acts as a key to the locked system. Nowadays, most common type of locking our computers is either with passwords or PINs. But these can be easily cracked by a professional attacker. In this security system, the computer doesn’t prompt for the password at all but requires Bluetooth in order to perform the locking and unlocking. Initially, the original user has to add his own Bluetooth smartphone device as registered/trusted device by pairing with them and he also has to set a password in the smartphone application in order to gain access to the system. The software automatically marks the MAC address of those smartphones as trusted. Next time when the computer boots up, this security system runs in the background and it checks for those registered devices. If any of those registered devices are present within the range of the computer, then the application in the smartphone prompts for the password and if the password is correct, computer is unlocked and the user has all access to the files in it. But if an unregistered Bluetooth device is found within the range of the computer, then the computer stays locked. This is done in order to increase the security as the computer stays locked in the presence of unregistered Bluetooth device. This software can be further locked with passwords, email integration etc. for more security.
Keywords
Bluetooth, Range, Address, Pairing.References
- https://en.wikipedia.org/wiki/Bluetooth#cite_note-3
- http://www.dealerscope.com/post/trends-report-bluetooth-booming/
- https://www.ijecs.in/index.php/ijecs/article/download/1495/1378
- http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf
- https://www.bluetooth.com/
- https://en.wikipedia.org/wiki/Bluetooth
- Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo, Improving the windows password policies using the mobile Bluetooth and rijndael encryption, IJCSMC vol.3 issue 3, 2014
- http://www.aircccj.org/cscp/volume2/csit2417.pdf
- Identification of Wearable Devices with Bluetooth by Hidayet Aksu; A. Selcuk Uluagac; Elizabeth Bentley.
- On the suitability of Bluetooth 5 for the Internet of Things: Performance and scalability analysis by Stefan Böcker; Christian Arendt; Christian Wietfeld
- https://www.pbs.org/newshour/science/unbreakable-quantum-password
- https://d3i6fh83elv35t.cloudfront.net/newshour/app/uploads/2015/08/statistic_id273550_cyber-crime_-number-of-breaches-and-records-exposed-2005-2014.png
- https://www.statisa.com/
- Source Code Block to Bring Down Phishing Attacks
Authors
1 Vidyavardhaka College of Engineering, Mysuru, IN
Source
Biometrics and Bioinformatics, Vol 10, No 5 (2018), Pagination: 104-107Abstract
Cyber-attacks are the attacks carried out mainly over the internet and victims being the internet users. Phishing is a malicious activity aimed at collecting sensitive user information, by recreating an environment that has similarity in functionalities and appearance to the one that manages this information. Phishing most commonly occurs on the Web and mainly initiated via an email where the user is redirected to a malicious website that is a copy of the legitimate website and the objective of which is to capture the information to impersonate the user on the original Website and access the user’s personal confidential data. Seeing the truth here we suggest a preventive anti-phishing technique to keep the users away from to be victims of phishing attacks.
Keywords
Cyber Attacks, Hacker, Internet, Phishing, Malicious.References
- PhishMe Report - https://www.darkreading. com/endpoint /91-- of - cyberattacks - start - with -a-phishing-email/d/d-id/1327704?.
- A Machine - Learning Approach to Phishing Detection and Defense - Iraj Sadegh Amiri, O.A. Akanbi, E. Fazeldehkordi.
- GoldPhish - Cyber Risk Management Solutions https://goldphish.com/.
- Anti-phishing Extension for Google Chrome https //www.theverge.com/2015/4/29/8513123/ phishing-password-alert-google-chrome-extension.
- Netcraft. Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/.
- Wu, M., R. C. Miller and S. L. Garfinkel. 2006. Do Security Toolbars Actually Prevent Phishing Attacks? In the Conference on Human Factors in Computing Systems. http: //www.simson.net/ref/2006/CHI-security-toolbarfinal.pdf.
- Large-Scale Automatic Classification of Phishing Pages, Colin Whittaker, Brian Ryner and Marria Nazif.
- Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. 2006. ISRI Technical report, CMU-ISRI- 06-112. Retrieved Sep 2, 2006, http://reportsarchive. adm.cs.cmu.edu/anon/isri2006 /CMU-ISRI-06-112.pdf.
- Phishing Attacks 2017 - https://www.info security-magazine.com /opinions /why-2017-phishing-attacks-teach/.
- Notable Phishing Scams - http://resources. infosecinstitute.com /top-ten-phishing-scams/# gref.
- R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM, 2006.
- Microsoft-ASSOCHAM survey - https:// economictimes. indiatimes.com / tech/ites/bpo - firms - lack-seriousness - on - cyber - fraud - threats-assocham-microsoft-survey/articleshow / 63529636.cms