Question: As technology evolves, so do new methods of authentication. We must improve all the security authentication methods that must be more protected and secure .

As technology evolves, so do new methods of authentication. We must improve all the security authentication methods that must be more protected and secure. The main issue we were faced with is that traditional authentication methods are highly vulnerable, meaning they can be exploited via various known methods such as social engineering and brute force attacks; this of course puts organizations at risk of data loss and data theft. When the employee leaves their device on while unattended and has their devices accessed by unauthorized personnel, we push us to utilize better, more secure authentication methods to prevent this action from happening. Also, it will be easier to guess the password, access the device, and steal the data of this employee. The best in this situation would be a proximity-based authentication device. A proximity-based authentication device would solve this issue by ensuring that the owner of the device is near it and that only they can unlock it because only they have access to that device. This reduces the risk of unauthorized users gaining access to others devices and causing a great deal of data loss, and perhaps even a data breach, to a company. In 2022, over 24 billion passwords were exposed by hackers. (Digital Shadows, 2022). As a result, if the password hacker does that, it will lead to unauthorized access so the hacker can access their personal information and do illegal activity, which will also lead to a privacy breach. He can access private messages and photos, and so when he accesses the device, he will use this data in a bad way and will be harmful for the user. For that, we will develop a device that is a proximity-based authentication device that utilizes NFCs (a set of short-range wireless technologies, typically requiring a distance of 4 cm or less to initiate a connection) to connect with and unlock the intended device when it is within proximity. The device includes a BLE module, a small battery, and a processor to encrypt data. It will provide users with better data protection in case of theft, prevent unauthorized access, and even enhance security against physical attacks. When we improve the authentication method, that will help employees feel safe if they forget their device so no one can access and steal the data without connecting the NFC to the device. It will help to reduce the number of password hackings. NFC is a powerful tool in the field of authentication if used appropriately.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!