These are the sources and citations used to research References: Password security. This bibliography was generated on Cite This For Me on
Passwords shouldn’t even be part of a network security vulnerability discussion knowing what we now know. However, many web applications, content management systems, and even database servers are still configured with weak or default passwords. Who needs file inclusion or SQL injection when the file system or database can be accessed directly?
In-text: (Beaver, n.d.)
Your Bibliography: Beaver, K., n.d. The Most Common Network Security Vulnerabilities. [online] Acunetix. Available at: <https://www.acunetix.com/blog/articles/the-top-5-network-security-vulnerabilities/> [Accessed 17 May 2018].
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies.
In-text: (What Is Network Security?, n.d.)
Your Bibliography: Cisco. n.d. What Is Network Security?. [online] Available at: <https://www.cisco.com/c/en/us/products/security/what-is-network-security.html> [Accessed 17 May 2018].
7 QUADRILLION YEARS
In-text: (Collider, 2018)
Your Bibliography: Collider, S., 2018. How Secure Is My Password?. [online] Howsecureismypassword.net. Available at: <https://howsecureismypassword.net/> [Accessed 17 May 2018].
Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
In-text: (NIST Special Publication 800-63B, n.d.)
Your Bibliography: Digital Identity Guidelines Authentication and Lifecycle Management. n.d. NIST Special Publication 800-63B. [online] Available at: <https://pages.nist.gov/800-63-3/sp800-63b.html> [Accessed 17 May 2018].
No technology provider can eliminate the possibility of human error.
In-text: (human side of IT security position, n.d.)
Your Bibliography: I.dell.com. n.d. human side of IT security position. [online] Available at: <http://i.dell.com/sites/doccontent/business/solutions/whitepapers/en/Documents/human-side-of-it-security-position-paper.pdf> [Accessed 17 May 2018].
In-text: (The Human Side of Security | SecurityWeek.Com, n.d.)
Your Bibliography: Securityweek.com. n.d. The Human Side of Security | SecurityWeek.Com. [online] Available at: <https://www.securityweek.com/human-side-security> [Accessed 17 May 2018].
10,587 students joined last month!