Authentication Protocol with Login & SignUp Functionality

 

Password security is a key aspect of cybersecurity. A password protects not only individuals, but also organisations including their applications, networks and systems infrastructure. Therefore it is imperative that high password security policies are put into place.

 

Current best practice suggests a 12 character complex password with a mixture of letters(both Capital & Lower case), numbers, symbols for example, would boost security of passswords. A complex password would be "CoMpL£xP@ss1" compared to "complexpass1". As you can see, the 1st password option is better and more secure. Complex passwords take much longer to brute force and guess and therefore due to the time taken, it is more secured and a password that is strong benefits individuals as well as organisations. By using a complex password, individuals & organisations protect themselves and help to ensure their data and information isnt accessed by malicious and unauthorised actors.

 

Best practices also suggest Two Factor/Multi-Factor Authentication. This means another factor that the user must know, have or is(iris scan, fingerprint etc.) For example, current best practices recommend Two Factor Authentication such as when you're logging into your bank, you may be asked to enter your username and password, and then an SMS code is sent to your mobile number. This is an example of Two Factor Authentication.  The SMS code is one-time and changes everytime a user logs into a system, whether successfully or unsuccessfully in some cases.

 

As you can imagine, combining a complex password, along with Two Factor Authentication would be very secure!

 

Benefits of a strong password are: 

  1. Sensitive Data is protected. For example banking data, financial data, health data and other personal data that you wouldn't want to fall into the hands of attackers and unauthorised people.
  2.  Unauthorised Access is prevented. Only a user has access to a password. If a password is secure, malicious actors can't attack systems and steal data and information that they shouldn't have access to.
  3. Identity theft and fraud. Cyber criminals steal passwords to commit fraud and identity theft. If a password is secure and complex, cyber criminals will have a hard time committing these crimes.
  4. Business Continuity. In an organisational sense, if an organisation has weak passwords put in place, attackers can commit attacks against their systems, steal data, resulting in data breaches. This would mean organisations face reputational damage, fines and also loss of trust from customers too. If an attacker gains access to a system, they can pivot and move onto other larger systems and increase their attack scope too.

 

Application Description: