The selected topic for this assignment is cybersecurity with a strong password.

english

Description

Reference List

            The selected topic for this assignment is cybersecurity with a strong password. The research question relating to the selected topic is “how to create a strong password for enhancing the cybersecurity in-network?” Below is the list of references for the chosen topic.

  1. Book

Rai, S. K., Mishra, P., Yadav, S. K., & Pandey, M. C. (2019). Cyber Security. Book Bazooka Publication.

Thakur, K., & Pathan, A.-S. K. (2020). Cybersecurity Fundamentals: A Real-World Perspective. CRC Press.

  1. Journal article with a DOI number

 

Chanda, K. (2016). Password Security: An Analysis of Password Strengths and Vulnerabilities. International Journal of Computer Network and Information Security, 23-30. doi:10.5815/ijcnis.2016.07.04

Chaudhary, S., Schafeitel-Tähtinen, T., & Helenius, M. (2019). Usability, security and trust in password managers: A quest for user-centric properties and features. Computer Science Review, 33, 69-90. doi:10.1016/j.cosrev.2019.03.002

Yıldırım, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 741–759. doi:10.1007/s10207-019-00429-y

  1. Journal article without a DOI number

Stavrou, E. (2017). A situation-aware user interface to assess users’ ability to construct strong passwords A conceptual architecture.

Wang, D., Zhang, X., Ming, J., Chen, T., & Wang, C. (2018). Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device. Wireless Communications and Mobile Computing.

  1. Website

Securedatarecovery. (2020). The Importance of Strong, Secure Passwords. Retrieved from Securedatarecovery: https://www.securedatarecovery.com/resources/the-importance-of-strong-secure-passwords

Cisecurity. (2016). Why Strong, Unique Passwords Matter. Retrieved from Cisecurity: https://www.cisecurity.org/newsletter/why-strong-unique-passwords-matter/

  1. Dissertation/thesis from a database

Tolis, P. (2019). Secure password authentication procedure utilizing vectored password list in safe repository. University of Derby .


Related Questions in english category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.