Sie sind auf Seite 1von 4

3 D Password

Abstract:
The 3D passwords are more customizable and very interesting way of authentication. Now
the passwords are based on the fact of Human memory. Generally simple passwords are set so as
to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition,
Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure
site, the 3D password GUI opens up. This is an additional textual password which the user can
simply put. Once he goes through the first authentication, a 3D virtual room will open on the
screen. In our case, lets say a virtual garage. Now in a day to day garage one will find all sorts of
tools, equipments etc. each of them having unique properties. The user will then interact with these
properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane.
Thats the moving attribute of each object. This property is common to all the objects in the space.
Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in
xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be
identified as an authentication. Only the true user understands and recognizes the object which he
has to choose among many. This is the Recall and Recognition part of human memory coming
into play. Interestingly, a password can be set as approaching a radio and setting its frequency to
number only the user knows. Security can be enhanced by the fact of including Cards and
Biometric scanner as input. There can be levels of authentication a user can undergo.
Current authentication systems suffer from many weaknesses. Textual passwords are
commonly used. Users tend to choose meaningful words from dictionaries, which make textual
passwords easy to break and vulnerable to dictionary or brute force attacks. Many available
graphical passwords have a password space that is less than or equal to the textual password space.
Smart cards or tokens can be stolen. Many biometric authentications have been proposed.
However, users tend to resist using biometrics because of their intrusiveness and the effect on their
privacy. Moreover, biometrics cannot be revoked. The 3Dpassword is a multi-factor authentication
scheme. The design of the 3D virtual environment and the type of objects selected determine the
3D password key space. User have freedom to select whether the 3D password will be solely recall,
recognition, or token based, or combination of two schemes or more.

Cyber Terrorism
Abstract:

The term cyber terrorism is becoming increasingly common in the popular culture,
yet a solid definition of the word seems hard to come by. While the phrase is loosely defined, there
is a large amount of subjectivity in what exactly constitutes cyber terrorism. In the aftermath of
the September 11th attacks, this is somewhat disconcerting.
In an attempt to define cyber terrorism more logically, a study is made of definitions
and attributes of terrorism and terrorist events. From these attributes a list of attributes for
traditional terrorism is developed. This attribute list is then examined in detail with the addition of
the computer and the Internet considered for each attribute. Using this methodology, the online
world and terrorism is synthesized to produce a broader but more useful assessment of the potential
impact of computer savvy terrorists. Most importantly, the concept of traditional cyber terrorism,
which features the computer as the target or the tool is determined to be only a limited part of the
true risk faced.
Finally, the authors discuss the impact this new view of cyber terrorism has on the
way in which one should build ones defenses. In particular, the breadth of the issue poses
significant questions for those who argue for vertical solutions to what is certainly a horizontal
problem. Thus, the validity of special cyber terrorism task forces that are disconnected or loosely
connected with other agencies responsible for fighting the general problem of terrorism is
questioned, and a broader, more inclusive method suggested.

Data Warehouse
Abstract:
Data warehouses and on-line analytical processing (OLAP) tools have become essential
elements of decision support systems. Traditionally, data warehouses are refreshed periodically
(for example, nightly) by extracting, transforming, cleaning and consolidating data from several
operational data sources. The data in the warehouse is then used to periodically generate reports,
or to rebuild multidimensional (data cube) views of the data for on-line querying and analysis.
Increasingly,

however,

we

are

seeing

business

intelligence

applications

in

telecommunications, electronic commerce, and other industries, that are characterized by very high
data volumes and data flow rates, and that require continuous analysis and mining of the data. For
such applications, rather different data warehousing and on-line analysis architectures are required.
In this paper, we first motivate the need for a new architecture by summarizing the requirements
of these applications. Then, we describe a few approaches that are being developed, including
virtual data warehouses or enterprise portals that support access through views or links directly to
the operational data sources. We discuss the relative merits of these approaches. We then focus on
a dynamic data warehousing and OLAP architecture that we have developed and prototyped at HP
Labs. In this architecture, data flows continuously into a data warehouse, and is staged into one or
more OLAP tools that are used as computation engines to continuously and incrementally build
summary data cubes, which might then be stored back in the data warehouse. Analysis and data
mining functions are performed continuously and incrementally over these summary cubes.
Retirement policies define when to discard data from the warehouse (i.e., move data from the
warehouse into off-line archival storage). Data at different levels of aggregation may have different
life spans depending on how they are to be used for downstream analysis and data mining. The
key features of the architecture are the following: incremental data reduction using OLAP engines
to generate summaries and enable data mining; staging large volumes and flow rates of data with
different life spans at different levels of aggregation; and scheduling operations on data depending
on the type of processing to be performed and the age of the data.

Das könnte Ihnen auch gefallen