Password authentication has become ubiquitous in the cyber age. To-date, there have been several studies on country based passwords by authors who studied, amongst others, English, Finnish, Italian and Chinese based passwords. However, there has been a lack of focused study on the type of passwords that are being created in Africa and whether there are benefits in creating passwords in an African language. For this research, password databases containing LAN Manager (LM) and NT LAN Manager (NTLM) hashes extracted from South African organisations in a variety of sectors in the economy, were obtained to gain an understanding of user behaviour in creating passwords. Analysis of the passwords obtained from these hashes (using several cracking m...
With the increase of Internet of Things (IoT) and threats on Information Systems (IS) resources, it ...
Passwords are considered the most commonly used method of authentication. Unfortunately, weak passw...
Control mechanisms established on the boundary of an information system are an important preliminary...
Password authentication has become ubiquitous in the cyber age. To-date, there have been several stu...
The increases in computerized mode of operations and the activities of identity attackers have not o...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
The challenge of having to create and remember a secure password for each user account has become a ...
In today’s world, taking secret word hash records and cracking the hash passwords has become extreme...
CITATION: Butler, R. & Butler, M. 2015. The password practices applied by South African online consu...
Background: Online security is a growing concern and user authentication through passwords remains a...
Information security is necessary for any organization. Intrusion prevention is the basic level of s...
Many researchers have discussed password creation and strength, but this paper takes a look at passw...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
While passwords have served the purpose of authentication throughout human history, text passwords h...
This thesis focuses on studying characteristics of Norwegian passwords as a means to find the best w...
With the increase of Internet of Things (IoT) and threats on Information Systems (IS) resources, it ...
Passwords are considered the most commonly used method of authentication. Unfortunately, weak passw...
Control mechanisms established on the boundary of an information system are an important preliminary...
Password authentication has become ubiquitous in the cyber age. To-date, there have been several stu...
The increases in computerized mode of operations and the activities of identity attackers have not o...
Research on more than 100 million passwords that have been leaked to the public domain has uncovered...
The challenge of having to create and remember a secure password for each user account has become a ...
In today’s world, taking secret word hash records and cracking the hash passwords has become extreme...
CITATION: Butler, R. & Butler, M. 2015. The password practices applied by South African online consu...
Background: Online security is a growing concern and user authentication through passwords remains a...
Information security is necessary for any organization. Intrusion prevention is the basic level of s...
Many researchers have discussed password creation and strength, but this paper takes a look at passw...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
While passwords have served the purpose of authentication throughout human history, text passwords h...
This thesis focuses on studying characteristics of Norwegian passwords as a means to find the best w...
With the increase of Internet of Things (IoT) and threats on Information Systems (IS) resources, it ...
Passwords are considered the most commonly used method of authentication. Unfortunately, weak passw...
Control mechanisms established on the boundary of an information system are an important preliminary...