2020
DOI: 10.37394/23204.2020.19.17
|View full text |Cite
|
Sign up to set email alerts
|

Review Reports on User Authentication Methods in Cyber Security

Abstract: The Internet has merged itself as an extremely ground- breaking stage that has changed the correspondence and business exchanges. Presently, the quantity of clients exploring the Internet is more than 2.4 billion. This enormous group of spectators requests online business, learning sharing, informal organizations and so on, which became exponentially in the course of recent years. Accordingly, it prompts the requirement for security and improved protection. As of late, misrepresentation over the Internet compr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In this paper, a case study is done in which a group of Cloud Security Alliances reviewed multiple articles based on cloud threats, got in touch with several experts, and visited different websites. The CSA group identified the nine most occurring and critical threats of cloud security, such as "Data Breaches, Data Loss, Account Hijacking, Insecure APIs, Denial of Service, Malicious Insiders, Abuse of Cloud Services, Insufficient Due Diligence [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this paper, a case study is done in which a group of Cloud Security Alliances reviewed multiple articles based on cloud threats, got in touch with several experts, and visited different websites. The CSA group identified the nine most occurring and critical threats of cloud security, such as "Data Breaches, Data Loss, Account Hijacking, Insecure APIs, Denial of Service, Malicious Insiders, Abuse of Cloud Services, Insufficient Due Diligence [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The identification and authentication process are an integral part of the interface of almost every application used, with some data to be accessed requiring a strong password composed of uppercase and lowercase letters, numbers and special characters. [11] Of great importance is the speed and efficiency of resolving incidents related to information security of users. Cyber-attacks often cause personal and business data to be compromised, and are caused by viruses, worms, Trojan horses, spyware, or similar programs that can cause harm to Internet users.…”
Section: Introductionmentioning
confidence: 99%