Password Protection

“Ni, Min” [ Frank], Inventor of “Graphic Access Tabular Entry (GATE)” innovation, and winner of “Cyber-Security Innovation Award” in 2017 at International Cyber Security and Intelligence Conference in Toronto, Canada; participates in Risk Roundup to discuss “Password Protection”.


While passwords have become a part of everyday life, the debate remains whether passwords are a secure means of authentication and whether we should even continue using passwords. Irrespective of whether we use passwords or not, the reality remains that the digital global age has brought us a need for secured login and authentication protocol for logging into websites, email accounts, social media accounts, financial accounts, trade accounts, smartphone pass codes, ATM pin numbers, home security systems, alarm codes and so much more.  This is mainly because, individuals and entities across nations: its government, industries, organizations and academia (NGIOA) are increasingly accessing digital services over the years; and exponentially growing the need for strong user id and passwords.

While a more secure means of authentication is both necessary in near term as well as long term, the reality remains that as long as passwords remains a common method of authentication, privacy and security has become a fundamental necessity.

  • So, how to secure passwords effectively?
  • Are there any new ideas, new innovations and advances in technology that can bring us a promise of password security?

Let us evaluate this further-

Current State of Password Protection

In cyberspace, passwords are commonly used during a log in process that controls access to protected operating systems on computers, mobile phones, cable TV, automated teller machines (ATMs), and more. As a typical user in cyberspace has passwords for many purposes, it is important to evaluate:

  • What is the state of user account creation, authentication and protection in cyberspace?
  • Is user id and password the right approach to authenticate access to connected computers in cyberspace?
  • How does password protection vary on different forms of computers and operating systems?
  • What is the state of privacy and security when an individual enters user id and password?
  • Is there a common practice for computer systems to hide passwords as they are typed?
  • What factors play a role in the security of a password system?
  • What are some specific password management issues that must be considered for password security?
  • How do passwords get verified over a network?
  • How are procedures defined for changing password?
  • What are the problems with today’s passwords?
  • How to make passwords secured?
  • How to manage the password process?
  • What security risks emerge when the same password is used on multiple sites?
  • What methods are available today to strengthen password security?
  • What role system incompatibility plays in password security?
  • How easy is it to crack passwords?
  • What impact does password sharing have on security?
  • What different tools and technologies are available for password authentication and security?
  • What are the alternative to passwords for authentication?

Graphic Access Tabular Entry (GATE)

  • What is GATE?
  • How does GATE strengthen password security?
  • What security problem GATE solves?
  • How does the GATE system overcome the password weakness?


Amidst rising numbers of connected devices, the explosive growth of passwords is leading to complex threats to digital security. Since “Password Security” brings complex security challenges, we need to evaluate different approach to login credentials and communication.

Time is now to discuss Password Protection Risks”!

For more please watch the Risk Roundup Webcast or hear Risk Roundup Podcast

About the Guest

“Ni, Min” [ Frank], Inventor of “Graphic Access Tabular Entry (GATE)” innovation that has won “Cybersecurity Innovation Award” in 2017 at International Cyber Security and Intelligence Conference in Toronto, Canada

About the Host of Risk Roundup
Jayshree Pandya (née Bhatt) is a visionary leader, who is working passionately with imagination, insight and boldness to achieve Global Peace through Risk Management. It is her strong belief that collaboration within, between and across nations: its government, industries, organizations and academia (NGIOA) will be mutually beneficial to all—for not only in the identification and understanding of critical risks facing one nation, but also for managing the interconnected and interdependent risks facing all nations. She calls on nations to build a shared sense of identity and purpose, for how the Security Centric Integrated Cyberspace, Geospace and Space Risk Management framework is structured will determine the survival and success of nations in the Digital Global Age. She sees the big picture, thinks strategically and works with the power of intentionality and alignment for a higher purpose—for her eyes are not just on the near at hand but on the future of humanity!

At Risk Group, Jayshree is driving the thought leadership on “Strategic Security Risk Intelligence”! She believes that Cyberspace, Geospace or Space (CGS) cannot be secured if NGIOA works in silo within and across its geographical boundaries. As security requires an integrated NGIOA approach with a common language, she has recently launched Cyber-Security, Geo-Security and Space- Security Risk Research Centers that will merge the boundaries of Geo-Security, Cyber-Security and Space-Security.

In 2015, Jayshree launched “Risk Roundup” an Integrated Cyber-Security, Geo-Security and Space-Security Risk Dialogue. Risk Roundup Webcast/Podcast are available on YouTube, iTunes, Google Play, Risk Group website, and professional social media.

Jayshree’s inaugural book, The Global Age: NGIOA @ Risk, was published by Springer in 2012.

About Risk Roundup

Risk Roundup: Webcast/Podcast, a global initiative launched by Risk Group, is an integrated cyberspace, geospace, and space (CGS) security risk dialogue for individuals and entities across nations: its government, industries, organizations and academia (NGIOA). Risk Roundup is directly trying to promote and enhance CGS risk intelligence by collective participation of decision makers from across NGIOA.

Risk Roundup is released in both audio (Podcast) and video (Webcast) format and is available for subscription at (Risk Group WebsiteiTunesGoogle PlayStitcher RadioAndroid, and Risk Group Professional Social Media).

About Risk Group

Risk Group is an integrated cyberspace, geospace and space (CGS) security risk research organization. Risk Group is on a mission to epitomize collective risk intelligence of nations: its government, industries, organizations and academia (NGIOA) as the synergistic intersection among independent as well as interconnected and interdependent CGS security risks to help achieve an effective process for better collective security risk intelligence, management and governance than silo and fragmented security risk approach that we have across nations today. Risk Group is determined to engage the collective NGIOA risk intelligence capability to manage CGS security risks—risks impacting individuals and entities across NGIOA. Having a collective NGIOA risk intelligence capability will be transformative for not only achieving CGS security but also global peace.

Risk Group believes that risk management, security and peace walk together hand in hand. Though security is related to management of threats and peace to the management of conflict, risk management is related to management of security vulnerabilities as well as management of conflict, and it is not possible to conceive any one of the three without the existence of the other two. All three concepts feed into each other. Risk Group believes that the security we build for ourselves is precarious and uncertain until it is secured for everyone across nations. Tradition becomes our security-so if we build a culture of managing risks effectively it will lead us to security and security will lead us to peace!

Copyright Risk Group LLC. All Rights Reserved