Password cracking

Results: 174



#Item
131Password / Computer crimes / GrIDsure / Personal identification number / Keystroke logging / Challenge-response authentication / Transaction authentication number / Password cracking / Password strength / Security / Computer security / Access control

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Ch

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-08-04 12:40:39
132Computer crimes / Password / Phishing / Keystroke logging / Password strength / Password cracking / Security / Computer security / Access control

May 2012 MONTHLY Cyber Security Newsletter

Add to Reading List

Source URL: www.its.ms.gov

Language: English - Date: 2014-08-01 12:46:24
133Cyberwarfare / Hacker / Password strength / Password cracking / Security / Computer security / Password

Connect Smart: Understanding public perceptions toward cyber security Executive summary of consumer research June 2014

Add to Reading List

Source URL: www.connectsmart.govt.nz

Language: English - Date: 2014-06-16 17:44:41
134Access control / Password / Passphrase / Password cracking / Password manager / Security / Cryptography / Computer security

Password Policy 1. Purpose: The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change of the passwords. 2. Scope: The scope of

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2013-11-26 23:29:39
135Cryptography / Computer law / Crimes / Password cracking / System administration / Password / Salt / Shadow password / Crypt / System software / Security / Computer security

Improving System Security via Proactive Password Checking Matt Bishop Department of Computer Science University of California at Davis Davis, CA[removed]removed]

Add to Reading List

Source URL: www.klein.com

Language: English - Date: 2002-03-05 20:44:27
136Cyberwarfare / Wi-Fi / Information security / Wired Equivalent Privacy / Computer security / Password / Internet privacy / Wireless security / Cracking of wireless networks / Computer network security / Security / Computing

Personal Computers and Networks Information Security for Personal Banking Customers Maintaining a Secure Personal Computer – what you can do to protect yourself. The internet is a convenient and valuable tool. With thi

Add to Reading List

Source URL: www.firstfd.com

Language: English - Date: 2013-10-03 14:55:01
137Cryptography / Password / Cryptographic software / Crypt / Password policy / Password cracking / Security / Computer security / Access control

Microsoft Word - Password Policy_v9.doc

Add to Reading List

Source URL: www.mtroyal.ca

Language: English - Date: 2013-12-08 07:08:33
138Access control / Password / Keystroke logging / Phishing / Password strength / Password cracking / Security / Computer security / Computer crimes

Cyber Security Monthly Newsletter April 2012 Volume 7, Issue 4 Cyber Security and You – Creating a Secure Password

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2012-11-10 18:04:13
139Cyberwarfare / Password strength / Password cracking / Security / Password / Computer security

NCHICA Security Template – Internal Security Requirements Check List NCHICA Security Template – Internal Security Requirements Check List SYSTEM: ___________________________ SECURITY ADMINISTRATOR: ________________

Add to Reading List

Source URL: www.nchica.org

Language: English - Date: 2004-09-23 10:51:20
140SHA-1 / Cryptography / Abstraction / Security / Computer security / Password cracking / Cryptographic hash functions / Password / Crypt

CALIFORNIA STATE SCIENCE FAIR 2013 PROJECT SUMMARY Name(s) Sohil Bammi; Brandon Betkolia; Eric Zhou

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2013-04-13 17:38:40
UPDATE