STRATEGY OF PASSWORDS

Strategy of Passwords: A Detailed Outline and an Annotated Bibliography

Introduction

Don't use plagiarized sources. Get Your Custom Essay on
STRATEGY OF PASSWORDS
Just from $13/Page
Order Essay
  • What is a password?
    • A password can be defined as a security mechanism that enables individuals and organisations protect their systems and documents from unauthorized individuals. A password is a basic security mechanism is made up of a secret pass phrase that is created using numeric, alphabetic, alphanumeric and symbolic characters or even a combination of the three symbols (Burnett, 2016). 
  • A brief history of password
    • Passwords have been used from a very long period. In ancient societies, soldiers would ask individual wanting to enter a secured area for a watchword or a password before being allowed to enter the secured area (Burnett, 2016). The Second World War Two is the period that saw massive usage of password was introduced. 
  • The main objective of having a password
    • To secure systems
    • To secure files and data
    • To prevent unauthorized use of data and systems to harm an individual or organisation  (McDonald, 2017).

Main body

  • How to choose a good and memorable password
    • A good password has to be chosen carefully and it must have the following features:
      • Memorable
      • Hard to hack to ensure  system, data, and documents are secure
      • Easy to retrieve when one forgets it (Strout, 2013)
      • Measures that should be put in place to ensure the password cannot be compromised
  • Password in computers
    • In computers and devices such as phones, passwords help in:
      • They help protect systems
      • They protect data and documents
      • They help protect data and files that should not be accessed by unauthorized persons (Turing, 2017)
  • Password cracking
    • In computer security, password cracking is the process taken to recover lost password. It mostly involves repeatedly guessing the password in order to get the correct one. It is also the measures taken by hackers who want to break into a system in order to use the data and information stored there in a negative way.  

Conclusion

  • The paper has explained what password is and its main objective in information technology. It is important for people to understand the importance of password and make use of them to secure their data and systems.

Annotated Bibliography

In doing this paper, a number of credible sources will be used to research on the topic and help produce a good research paper. 

Burnett, M. (2016). Perfect Password: Selection, Protection, Authentication. New York, NY: Elsevier

  In this book, Burnet has done an in-depth discussion of passwords and how they have been used for a long period to protect data. The author also discusses the measures that an individual can use to ensure they have a secure password that can help in protecting private and confidential information (Burnett, 2016). The author has immense knowledge on the topic and information technology as a discipline and this is very important, as the information that will be got from this source will be reliable.

Strout, R. (2013). Password. Chicago, IL: Xlibris Corporation.

In this book, Strout starts by defining what a password is and gives the history and when the first password was used to help protect important information (Strout, 2013). He also gives a detailed account of how passwords have evolved to what they are today. He also gives a number of strategies organizations and individuals can use when making useable passwords for their devices and computers. 

Turing, J. (2017). Cybersecurity Series: Password Security. 

In this book, Turing talks about cyber security and the threats business entities face. For this reason, he advocates for the use of passwords (Turing, 2017). He does an in-depth analysis of how passwords work to protect users of information technology.

Dunphy, P. (2014) Usable, Secure and Deployable Graphical Passwords. Chicago, IL: Paul

Dunphy

Dunphy is an accomplished professor in the disciple of information technology making the information forms this source to be reliable. He talks about how to make password work for an organisation in securing data. This information will help in developing the paper since it is reliable.  

McDonald, J. (2017). The Password Book: Internet Security and Passwords Made Easy. New York, NY: Independently Published.

McDonald does an in-depth discussion of passwords. He talks about how they a simple password can help protect an organisation form hackers (McDonald, 2017). He goes on to talk about the measures that can be taken to help protect passwords in an organisation. 

References

Burnett, M. (2016). Perfect Password: Selection, Protection, Authentication. New York, NY:

Elsevier

Dunphy, P. (2014) Usable, Secure and Deployable Graphical Passwords. Chicago, IL: Paul

Dunphy

McDonald, J. (207). The Password Book: Internet Security and Passwords Made Easy. New

York, NY: Independently Published.

Strout, R. (2013). Password. Chicago, IL: Xlibris Corporation.

Turing, J. (2017). Cybersecurity Series: Password Security. New York, NY: Independently

Published.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE