Contact Us
Sign In / Sign Up for FREE
Go to advanced search...
Nobody downloaded yet

The Concept of Password Management - Research Paper Example

Comments (0) Cite this document
The paper focuses on the concept of password management and how to solve the issues of having so many passwords and having to change them for the different applications at the workplace. This research is necessitated by the increasing cases of identity theft…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
The Concept of Password Management
Read TextPreview

Extract of sample "The Concept of Password Management"

Download file to see previous pages Password management at the workplace is a constant struggle for the modern employee or worker. An employee at the workplace today possesses different passwords for different applications. It is thus hectic and challenging for an employee or worker to remember the different passwords for different applications. Additionally, due to the vast usage of passwords for online authentication services at the workplace, there is an increasing threat about the vulnerability of these passwords, which pose a security threat to the employee/worker, and the organization. Unauthorized personnel can commit identity theft or get access to private company data if they get access to employee passwords.

Too many passwords at the workplace for different applications use a lot of the employees’ mental resources. Further, employees take a lot of time remembering passwords. This time could have been spent productively in doing vital organization tasks. Therefore, research into the concept of password management is timely and vital as the modern/current organizations are increasingly using complex systems and applications which lead to the emergence of password management problems. The problems emanating from password management, as stated above, compromise employee and organization security, lead to lost productivity as a result of time wastage, and expensive delays. Hence, it is vital for organizations to comprehend and know how to tackle these problems through the implementation of effective password management policies on how to manage and change passwords at the workplace. Due to the high cognitive load required for employees to remember and manage passwords for different applications at the workplace, employees and company staff engage in password management practices that are often unhealthy and risky. Tryfonas & Askoxylakis (2015) in his research on employee password management habits found out that employees often use an existing password, slightly change the password, use a common name, or use one password for all applications at the workplace. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Any topic (writer's choice) Research Paper Example | Topics and Well Written Essays - 2250 words, n.d.)
Any topic (writer's choice) Research Paper Example | Topics and Well Written Essays - 2250 words. Retrieved from
(Any Topic (writer'S Choice) Research Paper Example | Topics and Well Written Essays - 2250 Words)
Any Topic (writer'S Choice) Research Paper Example | Topics and Well Written Essays - 2250 Words.
“Any Topic (writer'S Choice) Research Paper Example | Topics and Well Written Essays - 2250 Words”.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Concept of Password Management

Password Cracker

... is rerun, and then the make and the make install commands are run. For the make install command, we will prove to be a privileged user so that we can put the necessary libraries on the filesystem (i.e. use "sudo make install"). Once installation is complete, we can use Hydra from the command line or xHydra. Using the command line is totally adequate for nearly all requirements, but at times having a GUI is supportive. A Use Case One possible use case for Hydra can be to test the power of Drupal usernames and passwords. Drupal is an open source content management platform controlling millions of websites and applications. We have a users.txt and a password.txt file. The first file contains all users and the second contains all possible...
16 Pages(4000 words)Research Paper

Password Cracking System

Protecting an individual's data by restricting access to it can be done by means of placing a password entry request mechanism every time that particular data is accessed. There are however many means whereby which these passwords can be nullified. The Systems that enable the nullifying of passwords are referred to as "Password Cracking Mechanisms". This report is intended to throw a detailed light upon which password cracking mechanisms are and how they come into effect. Background The internet is an open medium which is accessible to just about anyone who logs on to it. While it has many benefits the internet is also not free of potential harmful activities. If personal information is left insecure and un attended on the intern...
25 Pages(6250 words)Research Paper

Password Cracking Systems

The research paper "Password Cracking Systems" discusses the password cracking systems in detail. Password cracking is a process of accessing a computer system, network or resource with or without making use of software applications to open a resource that has been locked with a password.
E-authentication (Electronic authentication) is a way of authenticating the client identities offered to an information system via electronic means. However, the e-authentication can create a technological issue for the reason that this procedure engages the remote or distant verification of particular people by using a digital communication network, intended for the idea of electronic administration and business. In fact, this idea offers pr...
20 Pages(5000 words)Research Paper

Management Concept

The fact is, with onset of new era of globalisation, the workforce is increasingly varied and faces problems due to geographical constraints, multilingual offices, changing organisational cultures and shifting domains as seen in case of IT organisations. The need of the hour is to develop a strategy to project a unified organisational culture which defines the whole character of the organisation and fosters an attitude of comradeship across employees, verticals, units and businesses thus creating a potential for organic and inorganic organisational growth. The new model on motivation that combines tenets of neuroscience, biology and evolutionary psychology points towards four basic needs (or drives) that guide motivation levels i...
4 Pages(1000 words)Essay

The Concept of Management Accounting

... role in management accounting as opposed to financial accounting. The information in management accounting has a computational dimension tailored for the managers; it uses management information systems, as opposed to financial accounting standards. Various concepts of management accounting exist for usage by managers and management teams within organizations and companies (Caplan, p. 156). This information plays a crucial role in decision-making processes within the organization and also assists in the formulation of strategies, business activities and enhances the budget-making process within the organization. Management accounting involves the process of measurement, identification, analysis, accumulation, interpretation, preparation...
3 Pages(750 words)Essay

Password Management Protocol

...?Password Management Protocol used to make secure verification (authentication) through proper utilization of several combined aspects to authenticate the identity of the person/entity longing to get right of entry (access) to the assets of the Information Technology equipments/resources. These resources could be confidential, private or valuable, for example, e-mail box (MS Outlook), personal computer, server room, etc. It is critical to protect these resources by several authentication technologies and the access may only be granted after thorough verification of digital identity. Information Technology infrastructure can be protected through diverse authentication techniques such as username and password combination, biometric...
3 Pages(750 words)Assignment

Management accounting concept

...?Accounting Research THESIS MENT This paper intends to discuss about a particular area of moral hazard which is associated with the management accounting concept. It further intends to elaborate about how this area delivers significant benefits to the managers and the organizations as a whole. Moreover, the paper will also entail the affiliation between moral hazard and decision making along with relevant information. QUESTION 1 Moral hazard is an interesting area of research in management accounting as it deals with various significant aspects concerning the perception of the managers in making effective decisions, determining disciplinary aspects and mitigating ethical issues. The area of moral hazard forecasts that the activities...
6 Pages(1500 words)Essay

Management Concept

A manager's job consists of planning, organizing, directing, and controlling the resources of the organization. These resources include people, jobs or positions, technology, facilities and equipment, materials and supplies, information, and money. Managers work in a dynamic environment and must anticipate and adapt to challenges.
The job of every manager involves what is known as the functions of management: planning, organizing, directing, and controlling. These functions are goal-directed, interrelated and interdependent. Planning involves devising a systematic process for attaining the goals of the organization. It prepares the organization for the future. Organizing involves arranging the necessary resources to carry out...
6 Pages(1500 words)Essay

Password and hacking under the privcy issues

...Password and Hacking under the Privacy Issues sur Research paper Password and Hacking under the Privacy Issues Table of contents: 1. Abstract 2. Introduction 3. Hacking – history, perspectives and justification 4. Legal privacy protection 5. Conclusions 1. Abstract This research paper is focused on identifying the impact of the hacking activities on each person’s privacy and the privacy issues that arise from it. It will analyze the concept of hacking and how it has evolved along time and it will provide a justification for the hackers from the inside point of view. Further, it will dwell on the legal protection provided both by Canada and the international legal system. Related cases to the hacking activities and their violation...
21 Pages(5250 words)Research Paper

Password Management Protocol vulnerabilities

...Password Management Protocol vulnerabilities By of the affiliation Department’s Paper’s Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized access. However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords. We will through the usage of one application that can show and copy passwords saved in the browser. Many users use autocompleting in their browser and this main threat for the password security and we...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic The Concept of Password Management for FREE!

Contact Us