This module explores the role of passwords in cybersecurity, covering their creation, management, and vulnerabilities, as well as strategies for strengthening password security to protect information.
Morris, Robert and Ken Thompson. “Password security: a case history,” Communications of the ACM 22(11),1979.
Adams, Anne and M. Angela Sasse, “Users are not the enemy,” Communications of the ACM v 42 no 12 (1999).
Bonneau, Joseph, Herley, Cormac, van Oorschot, Paul C, and Frank Stajano, “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,” IEEE Security and Privacy 2012.
Jagatic, Tom et al. “Social phishing.” Communications of the ACM, 50(10), 94-100, 2007.
Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking,” Wired, August 2012.
×
You have not selected any articles yet.
×
How the curriculum builder works
Make sure you select your site language before adding articles.
Choose a curriculum category.
Browse all the articles under the selected curriculum and add the ones you need to your list.
We use cookies to operate this website, improve useability, personalize your experience, and improve our marketing. Your privacy is important to us, and we will never sell your data.AcceptRejectPrivacy policy