Вы находитесь на странице: 1из 2

Evidence of Learning #1

Date: ​January 24, 2020

Subject: ​The key aspects of password security

MLA Citation:
“Password Safety.” ​Technology Safety​, National Network to End Domestic Violence, 2017,
www.techsafety.org/passwordincreasesecurity.

Charoen, Danuvasin. “Password Security .” ​International Journal of Security​, vol. 8, no. 1,


2014, doi:10.3897/bdj.4.e7720.figure2f.

Analysis:
Currently in my ISM journey, I am beginning to work on my original work alongside my
mentor. Therefore, my research has shifted from understanding the field of cybersecurity to
learning the complications and intricacies of my password-personal information cross checker.
This first article addresses these complications, essentially presenting me with the features I need
to either account for or include when creating my application. These include concerns with
relevance in terms of multi-factor authentication and single sign-on. The second article is a more
in-depth analysis of password security. It discusses the specifics of password security, such as
symbol variance and password standards. This article concludes by addressing the end security
of users and the relevance of password security to the overall security of the user. Both of these
articles are essential to the development of my original work, as they both address the specific
concerns I need to address in order to make the product applicable to the professional world.
The first article discusses concerns with password security in the professional world. The
most relevant concerns to my application are multi-factor authentication and browser password
saving. Multi-factor authentication is the additional layer of security that accounts offer. Usually,
in order to get past the authentication, the user has to use a secondary email or phone number. In
my current design, this new authentication method is not accounted for. Therefore, I need to
account for this service in order to make the application relevant to users. Additionally, browser
saving is currently a major security concern, as a majority of users use this to save them the
hassle of memorizing their unique passwords. However, if the user loses access to this
browser/computer, the user loses access to all their passwords. Therefore, my application needs
to address these concerns, which I will do by introducing the idea of password management
software like KeePass. This password management software creates a secure, centralized
location for users to store their information. My application will need to describe and offer
options for these softwares in order to actually encite password management changes within the
users.
The second article focuses on the thought process behind users and their password
choice. The article discusses how people tend to choose passwords they will remember, which
leads to users putting personal information within their passwords. The article goes on to explain
the psychology behind password choices. However, these details are extremely important for my
original work specifically; simply the idea that people put information in their passwords that
they will remember is the main issue my original work is going to address. Lastly, the article
discusses the findings from a study that compared to people’s password choices when making
multiple accounts. The study found that there was statistically significant data found to suggest a
correlation between password choice and memorable information overlap, which includes
personal information. Overall, this article serves a thorough analysis of peoples’ tendencies for
password choices, which in essence, describes the problem that my original work will address.
Both of these articles were extremely relevant to my original work. The first one was a
more of a casual, concise summary of the necessary features my application needs to account for,
while the second one discusses the psychology behind password choices and how this
psychology develops significant security threats for the users’ information. In conclusion, I will
incorporate the findings in both of these articles to ensure my original work is relevant to the
field of cybersecurity as well as society as a whole.

Вам также может понравиться