Reference List
The selected topic for
this assignment is cybersecurity with a strong password. The research question
relating to the selected topic is “how to create a strong password for
enhancing the cybersecurity in-network?” Below is the list of references for
the chosen topic.
Rai, S. K., Mishra, P.,
Yadav, S. K., & Pandey, M. C. (2019). Cyber Security. Book Bazooka
Publication.
Thakur, K., & Pathan,
A.-S. K. (2020). Cybersecurity Fundamentals: A Real-World Perspective.
CRC Press.
Chanda, K. (2016). Password
Security: An Analysis of Password Strengths and Vulnerabilities. International
Journal of Computer Network and Information Security, 23-30.
doi:10.5815/ijcnis.2016.07.04
Chaudhary, S.,
Schafeitel-Tähtinen, T., & Helenius, M. (2019). Usability, security and
trust in password managers: A quest for user-centric properties and features. Computer
Science Review, 33, 69-90. doi:10.1016/j.cosrev.2019.03.002
Yıldırım, M., & Mackie,
I. (2019). Encouraging users to improve password security and memorability. International
Journal of Information Security, 741–759. doi:10.1007/s10207-019-00429-y
Stavrou, E. (2017). A
situation-aware user interface to assess users’ ability to construct strong
passwords A conceptual architecture.
Wang, D., Zhang, X., Ming,
J., Chen, T., & Wang, C. (2018). Resetting Your Password Is Vulnerable: A
Security Study of Common SMS-Based Authentication in IoT Device. Wireless
Communications and Mobile Computing.
Securedatarecovery. (2020). The
Importance of Strong, Secure Passwords. Retrieved from Securedatarecovery: https://www.securedatarecovery.com/resources/the-importance-of-strong-secure-passwords
Cisecurity. (2016). Why
Strong, Unique Passwords Matter. Retrieved from Cisecurity: https://www.cisecurity.org/newsletter/why-strong-unique-passwords-matter/
Tolis,
P. (2019). Secure password authentication procedure utilizing vectored
password list in safe repository. University of Derby .
Get Free Quote!
275 Experts Online