Maintaining the security of information systems and associated data resources is vital if an organisation is to minimise losses. Access controls are the first line of defence in this process. The primary function of access controls is to restrict the use of information systems and resources to authorised users. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, evidence suggests that passwords as a means of authentication is often compromised by poor security practices. This paper presents the results of a survey that examines user practice in creating and using password keys and reports the find...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
The massive use of data on the cyberspace have led to threats, such as data breach and security harm...
User authentication is a vital element in ensuring the secure operation of computer-based systems. T...
Control mechanisms established on the boundary of an information system are an important preliminary...
Control mechanisms established on the boundary of an information system are an important preliminary...
Control mechanisms established on the boundary of an information system are an important preliminary...
Control mechanisms established on the boundary of an information system are an important preliminary...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Effective password management is crucial for safeguarding online accounts and sensitive information....
Information is considered a valuable asset to most organisations and is often exposed to various thr...
The primary function of access controls is to restrict the use of information systems and other comp...
Passwords are a critical part of information and network security. Passwords serve as primary authen...
CITATION: Butler, R. & Butler, M. 2015. The password practices applied by South African online consu...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
The massive use of data on the cyberspace have led to threats, such as data breach and security harm...
User authentication is a vital element in ensuring the secure operation of computer-based systems. T...
Control mechanisms established on the boundary of an information system are an important preliminary...
Control mechanisms established on the boundary of an information system are an important preliminary...
Control mechanisms established on the boundary of an information system are an important preliminary...
Control mechanisms established on the boundary of an information system are an important preliminary...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Effective password management is crucial for safeguarding online accounts and sensitive information....
Information is considered a valuable asset to most organisations and is often exposed to various thr...
The primary function of access controls is to restrict the use of information systems and other comp...
Passwords are a critical part of information and network security. Passwords serve as primary authen...
CITATION: Butler, R. & Butler, M. 2015. The password practices applied by South African online consu...
As users of technology in our everyday actions we need to authenticate in different applications, in...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
The massive use of data on the cyberspace have led to threats, such as data breach and security harm...