Information Security Management: Password Security Issues
نویسندگان
چکیده
منابع مشابه
Security Issues in Smart Card Based Password Authentication Scheme
To secure information from unauthorized access, various authentication schemes have been deployed. Among these, password based authentication schemes using smart card are widely used for various applications such as remote user login, online banking, ID verification, access control and e-commerce. It provides mutual authentication between user and server. However, previous schemes are vulnerabl...
متن کاملIntelligent System for Information Security Management: Architecture and Design Issues
The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computi...
متن کاملFuzzy Modeling for Information Security Management Issues in Cloud Computing
The purpose of this study was to collect key success factors (KSFs) that determine information security management in cloud computing. Through contemporary literature reviews, we emphasized four major aspects: the external dimension, the internal dimension, the technology dimension, and the execution dimension. We used these dimensions to develop a questionnaire for collecting the responses fro...
متن کاملInformation Security Risk Management
The increasing dependence on information networks for business operations has focused managerial attention on managing risks posed by failure of these networks. In this paper, we develop models to assess the risk of failure on the availability of an information network due to attacks that exploit software vulnerabilities. Software vulnerabilities arise from software installed on the nodes of th...
متن کاملDiscovering Information Security Management
This thesis is concerned with issues relating to the management of information security in organisations, motivated by the need for cost-efficient information security. It is based on the assumption that: in order to achieve cost-efficient information security, the point of departure must be knowledge about the empirical reality in which the management of information security takes place. The d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Academic Journal of Interdisciplinary Studies
سال: 2018
ISSN: 2281-4612
DOI: 10.2478/ajis-2018-0045