The advancement of technology has resulted in numerous positive results. The majority of human activities can now be
substantially simplified thanks to technological improvements. The same is true for cybercriminals who, among other things, want to
get access to user accounts in order to steal sensitive information for their own purposes. Even if technology improvements are clearly
good, it is our job as customers to take all reasonable efforts to protect our data. There are several precautions at our disposal.
However, the security of any given system is never guaranteed. All of our efforts are aimed at lowering the likelihood of a security
breach. Authentication is carried out via a textual and graphical password paradigm[1]. We chose this approach because humans are
naturally visual beings, and we believe that adopting a cued-recall and recognition-based method can increase a system's defences. A
password with an entropy [5] of 60 or above is considered strong. This password technique, once rigorously tested, can prove to be a
very good alternative to multi-factor authentication, which would force the user to wait for an OTP or some other annoyance. Our
method seeks to alleviate all of the difficulties faced during the process by proposing a simple gateway for user identification. This
approach aids in the creation of passwords with entropy near to 89, which is considered a strong password.
Keywords— security breach, authentication, entropy, password