In our purposed system, we try to assure that the users’ data is safe by implementing a system which “provides security mechanisms” by offering three layers of security. The system uses a password generator algorithm to implement passwords as well as keys for authorizing the user. The algorithm generates a password and a key of 8 bit length consisting of combinations of characters, special characters, as well as numbers.Questions may arise as why do we use keys of 8 bit length only? The purpose of our system is to prevent unauthorized data access if the users’ credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust.