Cyber security password policy for industrial control networks

S Sarkar, S Sarkar, K Sarkar… - 2015 1st International …, 2015 - ieeexplore.ieee.org
An enormous growing of Information Technology and its applications in diverse fields
enables us to think for digital world wherein cyberspace is being emerged significantly. After …

A comparison of password management policies

B Brumen, R Ivančič, I Rozman - 2016 Portland International …, 2016 - ieeexplore.ieee.org
Managing of passwords in information systems is a very important task, yet nothing seems to
be learned from the recent stories. The consequences of bad password management …

Level of the information security awareness of the mechanical engineering students

G Kiss, A Szasz - … Based Higher Education and Training (ITHET …, 2016 - ieeexplore.ieee.org
Aim of this research to analysing the level of the information security awareness of the
undergraduate mechanical engineering students after the second semester. The access of …

Research on the internet banking security based on dynamic password

Y Xiong - 2011 2nd International Conference on Artificial …, 2011 - ieeexplore.ieee.org
Dynamic password is one of important parts in the research on the Internet banking security.
This paper classifies the popular dynamic password product used in the banking, analyzes …

Analysis on the security and use of password managers

C Luevanos, J Elizarraras, K Hirschi… - 2017 18th International …, 2017 - ieeexplore.ieee.org
Cybersecurity has become one of the largest growing fields in computer science and the
technology industry. Faulty security has cost the global economy immense losses …

Quality of password management policy

C Villarrubia, E Fernandez-Medina… - … Reliability and Security …, 2006 - ieeexplore.ieee.org
The use of passwords is the most common method to carry out the authentication of users in
information systems. For this reason, quality in the password management is a need to …

Towards designing and implementing a secure one time password (OTP) authentication system

S Roy, M Rutherford… - 2016 IEEE 35th …, 2016 - ieeexplore.ieee.org
In this work we propose to design and implement a secure one-time password (OTP) system
to provide a better method of enforcing a stricter set of policies, that bypass natural human …

Authentication: An overview, its types and integration with web and mobile applications

SR Basavala, N Kumar… - 2012 2nd IEEE …, 2012 - ieeexplore.ieee.org
In the recent day's web applications usage is increasing by banking, financial institutes and
health or hospital management systems such as online or net banking and mobile banking …

Information security: securing a network device with passwords to protect information

M Ahmed, L Sharif, A Issa-Salwe… - Trends in Information …, 2010 - arastirmax.com
Information security is a complex and critical subject, conventionally only tackled by well-
trained and experienced professionals. The importance of an effective password policy at …

Password based authentication: Philosophical survey

A Sharma, RC Belwal, V Ojha… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
The security of many computer systems hinges on the secrecy of a single word-if an
adversary obtains knowledge of a password, they will gain access to the resources …