Passwords

This module explores the role of passwords in cybersecurity, covering their creation, management, and vulnerabilities, as well as strategies for strengthening password security to protect information.

Portal > Cybersecurity > Passwords

Curriculum Builder

Morris, Robert and Ken Thompson. “Password security: a case history,” Communications of the ACM 22(11),1979.

Adams, Anne and M. Angela Sasse, “Users are not the enemy,” Communications of the ACM v 42 no 12 (1999).

Bonneau, Joseph, Herley, Cormac, van Oorschot, Paul C, and Frank Stajano, “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,” IEEE Security and Privacy 2012.

Jagatic, Tom et al. “Social phishing.” Communications of the ACM, 50(10), 94-100, 2007.

Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking,” Wired, August 2012.