Home Start Back Next End
  
Chapter 1
Introduction
1.1 Background
Nowadays
when
the
technology
become
more advance
people
can
obtain
information
easily
and
when
people
already
get
the
information
they
can
manipulate
the
data.
In
order
to
prevent
the
information
or
important data being manipulated by unauthorized
person then people also try to develop new technology to secure the used of the
information
or
data
from
unauthorized
person.
One
way
to
protect
the
information
or
data is using password before people can use or get the information. Using password to
acquire the information is very common nowadays;
many people and
many systems
use
this 
method  to  protect  their 
information 
from  unauthorized  person. 
The  password
actually only known by
the authorized
user only, but
nowadays
the attacker can obtain
the user password easily.
Since it use for security purpose then sometimes people wants to make it easy by using
same
password
for
login
to
a
system,
ATM,
and
etc.
The
password
itself has
characteristic that can only verify the user and cannot identify the user. This means
whoever
get
the
password
can
access
the
information
or
get
it,
although
that
person
is
not
an
authorized
person to
access
the
information.
Besides
using
password
to
protect
people
try
to
use signature
in particular system, such as
for
using the credit card where
we must sign and the casher officer try to match the signature pattern with the one on the
card,
but
the
use
of
signature
also
has
same
problems
with
the
password
method.
The
problems 
are 
same 
since 
the 
signature’s 
characteristic 
same 
like 
the 
password’s
1
Word to PDF Converter | Word to HTML Converter