These are the sources and citations used to research References: Password security. This bibliography was generated on Cite This For Me on

  • Website

    Beaver, K.

    The Most Common Network Security Vulnerabilities

    Acunetix

    Passwords shouldn’t even be part of a network security vulnerability discussion knowing what we now know. However, many web applications, content management systems, and even database servers are still configured with weak or default passwords. Who needs file inclusion or SQL injection when the file system or database can be accessed directly?

    In-text: (Beaver, n.d.)

    Your Bibliography: Beaver, K., n.d. The Most Common Network Security Vulnerabilities. [online] Acunetix. Available at: <https://www.acunetix.com/blog/articles/the-top-5-network-security-vulnerabilities/> [Accessed 17 May 2018].

  • Website

    What Is Network Security?

    Cisco

    Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies.

    In-text: (What Is Network Security?, n.d.)

    Your Bibliography: Cisco. n.d. What Is Network Security?. [online] Available at: <https://www.cisco.com/c/en/us/products/security/what-is-network-security.html> [Accessed 17 May 2018].

  • Website

    Collider, S.

    How Secure Is My Password?

    2018 - Dashlane

    7 QUADRILLION YEARS

    In-text: (Collider, 2018)

    Your Bibliography: Collider, S., 2018. How Secure Is My Password?. [online] Howsecureismypassword.net. Available at: <https://howsecureismypassword.net/> [Accessed 17 May 2018].

  • Website

    NIST Special Publication 800-63B

    NIST

    Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

    In-text: (NIST Special Publication 800-63B, n.d.)

    Your Bibliography: Digital Identity Guidelines Authentication and Lifecycle Management. n.d. NIST Special Publication 800-63B. [online] Available at: <https://pages.nist.gov/800-63-3/sp800-63b.html> [Accessed 17 May 2018].

  • Website

    human side of IT security position

    Dell

    No technology provider can eliminate the possibility of human error.

    In-text: (human side of IT security position, n.d.)

    Your Bibliography: I.dell.com. n.d. human side of IT security position. [online] Available at: <http://i.dell.com/sites/doccontent/business/solutions/whitepapers/en/Documents/human-side-of-it-security-position-paper.pdf> [Accessed 17 May 2018].

  • Website

    The Human Side of Security | SecurityWeek.Com

    security week

    In-text: (The Human Side of Security | SecurityWeek.Com, n.d.)

    Your Bibliography: Securityweek.com. n.d. The Human Side of Security | SecurityWeek.Com. [online] Available at: <https://www.securityweek.com/human-side-security> [Accessed 17 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join