Abstract: Data leakage detection is an important security measure for organizations to protect their sensitive data from unauthorized access. Graphical passwords are an alternative method of authentication that can be used to detect data leakage. Graph are on The’s ability to remember recognize images, shapes, or patterns. This type of authentication is more secure than traditional text-based passwords as it is more difficult for attackers to guess or crack. This abstract discusses the potential of using graphical passwords for data leakage detection. Graphical passwords are a form of user authentication that involves selecting images or patterns to create a password. This method of authentication can provide a higher level of security compared to traditional alphanumeric passwords, as it allows users to create complex and unique passwords that are difficult for attackers to guess or crack. Data leakage detection is an important aspect of information security, as it helps organizations detect and prevent unauthorized access to sensitive information. By using graphical passwords as an authentication method, it may be possible to detect data breaches and alert users to potential security threats. However, the effectiveness of using graphical passwords for data leakage detection will depend on the specific implementation and design of the system. Some potential weaknesses of graphical passwords have been identified, such as the susceptibility to shoulder surfing and the challenge of designing secure and user-friendly graphical password schemes. Further research is needed to explore the potential of using graphical passwords for data leakage detection and to identify best practices for designing and implementing such systems. By addressing the weaknesses and challenges of graphical passwords, it may be possible to create a highly effective and secure authentication system that can help prevent data leakage and protect sensitive information.

 Index Terms – Data Leakage, AES(Advanced Encryption Standard), Text-based password, Graphical Password, Cyber Security.


PDF | DOI: 10.17148/IJARCCE.2023.12607

Open chat
Chat with IJARCCE