z-logo
open-access-imgOpen Access
Password Auditing Tools
Author(s) -
Mario Garcia
Publication year - 2020
Publication title -
2006 annual conference and exposition proceedings
Language(s) - English
Resource type - Conference proceedings
DOI - 10.18260/1-2--192
Subject(s) - computer security , password , computer science , password policy , authentication (law) , compromise , audit , data integrity , confidentiality , internet privacy , one time password , business , social science , accounting , sociology
A goal of computer system security is to prevent an attack, and authentication mechanisms can prevent a compromise on parts of a system. Most if not all forms of access are granted based on a single authentication scheme, and passwords are currently the most widely used authentication mechanism. Weak passwords have been cited by experts from industry, government, and academia as one of the most critical security threats to computer networks. However, various applications are available today which allow system administrators to assess the strength of their passwords in order to take the necessary precautions. The purpose of this report is to conduct a study of how well some of the more popular password auditing applications perform for Windows and UNIX operating systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom