PASSWORD PROTECTION: END USER SECURITY BEHAVIOR

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End User Authentication (EUA) Model and Password for Security

Authentication is one among a set of services that constitute a security subsystem in a modern computing or communications infrastructure. End User Authentication flexibility model proposed in this article will allow the user to have multiple authentications with varying levels of guarantee, and for suppliers to request and rely on mechanisms appropriate to the service requested. We describe th...

متن کامل

PSV (Password Security Visualizer): From Password Checking to User Education

This paper presents the Password Security Visualizer (PSV), an interactive visualization system specifically designed for password security education. PSV can be seen as a reconfigurable “box” containing different proactive password checkers (PPCs) and visualizers of password security information, allowing it to be used like a “many in one” or “hybrid” PPC. PSV can provide many new features tha...

متن کامل

End User Security

This paper details security risks, compromises, and options available to the average computer user. It includes specific discussions of encryption and password security. Analysis of a survey of Harvey Mudd students is also presented.

متن کامل

User Behaviours Associated with Password Security and Management

Control mechanisms established on the boundary of an information system are an important preliminary step to minimising losses from security breaches. The primary function of such controls is to restrict the use of information systems and resources to authorized users. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security ...

متن کامل

Surge Protection of End-User Equipment

This document is included in the Annex of Part 7 as historical background of a well-intentioned task that was completed at too slow a pace, missing its target date for serving as a reference for other in-process IEC standards projects concerned with low-voltage surge-protective devices. For the sake of historical accuracy and perspective, the document is presented here in its draft form, includ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computing

سال: 2014

ISSN: 2312-5381,1727-6209

DOI: 10.47839/ijc.13.1.616