Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2011, Procedia Computer Science
…
4 pages
1 file
In this paper, password management problems of network and system management will be handled. In this concept, password management and its usage in systems and networks will be introduced. Then password management problems that occurs in such situations like employee change, internal or external password distribution, will be investigated. In this paper the determination of password management problems will be done and these problems will be introduced.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
The growing number of online services needs users to have control over their password management system (generation, storage, recall). But the demand for total randomness and exclusivity of passwords is impractical in day-today life. Each component of a password management system comes with its cognitive burden on a user. There are many password management solutions available for users but every one of them has some drawbacks. Password managers have the ability to help users manage their passwords more successfully while also addressing many of the problems about password-based authentication. In this study, We're analyzing various previous studies regarding the effectiveness, usability, and security of password managers of all categories. Also, we're trying to come up with an ideal set of parameters to build the best possible password management system in 2022. This study will help to understand the key parameters and algorithms that we can use while building the ideal password generation, storage, and recall system for the user. I.
2010
communication via Internet travels across unsecured channels. This gives raise to security breaches. So user identification and authentication is needed to overcome these security breaches. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged. However, this survey shows that passwords are often compromised through the poor security and management practices of users. This paper also concentrates on user password composition and security practices for email accounts. The results of a survey that examines user practice in creating and using passwords are reported. Toward the end of this paper, we give some recommendation for the education of user in creating and maintaining their passwords.
International Journal of All Research Education & Scientific Methods
Cyber Security has become one of the biggest developing fields in software engineering and the innovation business. Defective security has cost the worldwide economy colossal misfortunes. Whenever enormous security breaks occur, thousands to millions of passwords can be uncovered and put away into records, significance individuals are powerless to assaults. By and large, we utilize a great deal of passwords for our various records and recollecting every one of them is truly hard. A secret key is a series of characters which is utilized to really take a look at the genuineness of a client. These days, with the development of number of utilization each client utilizes, it turns out to be for all intents and purposes difficult to recall such countless complex passwords and reusing passwords on various applications isn't secure. This is where a secret phrase director comes into the image. A secret phrase chief is a completely safe vault where the client will actually want to save al...
International Journal of Information Security Science, 2016
Security policies force clients to frequently to change their password. This is particularly an issue for organisation with different administrations controlling applications. In this paper, we propose a functional and minimal effort verification mechanism that lessens client reliance to reset and confirmation of client for password change on multiple sites. The proposed arrangement does not require extra equipment for acquiring the new password to organisation's services. The proposed method includes utilization of a cellular telephone as a SMS based device coupled with password policy check with a citizen info web service.
Sri Lanka Journal of Social Sciences and Humanities
For over six decades, passwords have served as the primary authentication mechanism for almost all modern computer systems. However, password management is a challenging task for most computer users, and that has led users to many malpractices that open the door for most information security breaches over time. Despite many efforts, no alternative solution has ever succeeded in replacing passwords as the primary authentication mechanism. As a result, users are now heavily relying on password managers to alleviate the burden of manual password management. This paper addresses the topic of password management about different types of password managers and their inherent limitations. By evaluating the existing password management approaches and identifying potential improvements, this paper aims to signify an important research gap that exists in the study area; the need for fully automating the process of manual password management.
Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering
Nowadays online communication is increasing rapidly, password is provided as a key for communication henceforth there is a strong need to authenticate the online communication. But currently security breach occurs by stealing the password files through various ways of cyber attacks. cifferent technologies are available to safeguard password. The purpose of this paper is to evaluate various techniques for protection of password like graphical password, text password enhanced by Honeyword, Jumbling and salting approach.
1992
Remote commercial applications like databases, telebanking, electronic mail systems run security mechanisms based on passwords. Too many passwords per user become a security problem. The goal of this research is to design systems allowing "password-less" user access to network services while improving the security of existing password mechanisms.
2007
Abstract Passwords are an ubiquitous and critical component of many security systems. As the information and access guarded by passwords become more necessary, we become ever more dependent upon the security passwords provide. The creation and management of passwords is crucial, and for this we must develop and deploy password policies. This paper focuses on defining and modeling password policies for the entire password policy lifecycle. The paper first discusses a language for specifying password policies.
2008
The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security towards the end of the first decade of the 21 st century. Amongst solutions offered, the view that security programs have to be holistic is proposed indicating that technical controls are of little value without the workforce understanding the risks of their irresponsible behavior. Another solution proposed by them is the role of awareness and education. All levels of users should be targeted letting them understand their role and responsibility in information security. Password related behavior is often highlighted as a key component of information security
2007
Abstract The study that is reported here investigated password security and related issues at a South African tertiary institution. The main reason was to investigate why password security is such a problem for students. This was because students fell victim to people using their Internet identification to send nasty e-Mail, to visit pornographic websites, etc. The study used a questionnaire and IS&T students at the University of KwaZulu-Natal as respondents.
Journal of ancient Judaism , 2024
La Tercera Orilla, 2017
… la Energia Electrica, Anais do VI …, 2005
Guimarães: Forvisão, 2003
Journal of International Business Research and Marketing, 2015
Archaologische Mitteilungen aus Iran und Turan, 42, 87-112, 2011
MOUNT ARARAT and NOAH’S ARK HISTORY, MYTH and LAND, 2024
Southeast Asian Transformations: Urban and Rural Developments in the 21st Century, edited by Sandra Kurfurst & Stefanie Wehner , 2020
Journal of Constructional Steel Research, 2020
Technologies of Suspicion and the Ethics of Obligation in Political Asylum
Contexto Internacional
Journal of Spectroscopy, 2013
Journal of Kermanshah University of Medical Sciences, 2018
Annales Des Telecommunications, 1996
Computational Visual Media, 2016
International Journal of Therapies and Rehabilitation Research, 2016