Keywords:-
Article Content:-
Abstract
As digital security concerns escalate, password management remains critical to safeguarding personal and organizational information. This review article explores current practices and tools in password management, evaluating their efficacy and user adoption. The article aims to provide recommendations for improving password security and usability by analyzing recent advancements and common pitfalls.
References:-
References
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Proceedings of the 1999 CHI Conference on Human Factors in Computing Systems, 481-488. doi:10.1145/302979.303162
Bonneau, J., Herley, C., Oorschot, P. C., & Stajano, F. (2015). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. 2015 IEEE Symposium on Security and Privacy, 553-567. doi:10.1109/SP.2015.44
Florêncio, D., & Herley, C. (2010). Where do security policies come from? Proceedings of the 2010 Workshop on New Security Paradigms, 7-14. doi:10.1145/2046660.2046663
Katz, J. R., & Schneier, B. (2017). Password Security: What Users Know and What They Actually Do. Springer. doi:10.1007/978-3-319-32368-8
Kumar, K., & Sanghavi, A. (2022). Evaluating the effectiveness of password managers in improving user security. Journal of Cyber Security Technology, 6(2), 129-145. doi:10.1080/23742917.2022.2046671
Li, X., & Zhao, J. (2020). An empirical study on password management practices and their impact on security. International Journal of Information Security, 19(4), 375-388. doi:10.1007/s10207-020-05183-w
Morris, A. D., & Thompson, K. (1979). Password security: A case history. Communications of the ACM, 22(11), 594-597. doi:10.1145/359230.359257
O’Neill, M. (2021). The role of two-factor authentication in securing user accounts. Cybersecurity Review, 14(3), 201-215. doi:10.1016/j.csr.2021.05.001
Schneier, B. (2018). Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Norton & Company. ISBN: 978-0393608895
Van Oorschot, P. C., & Stajano, F. (2018). Security and Privacy in the Age of Cloud Computing. Wiley. doi:10.1002/9781119340681
Verizon Business (2023). Data Breach Investigations Report. Verizon. Available at:
https://enterprise.verizon.com/resources/reports/dbir/
Weir, M. D., & Aggarwal, K. (2020). Exploring the usability of passwordless authentication methods. ACM Transactions on Privacy and Security, 23(2), 8-26. doi:10.1145/3372297
Wright, J., & Haines, M. (2022). Password management: Tools and techniques for improving security. Journal of Information Privacy and Security, 18(1), 45-60. doi:10.1080/15536548.2022.1985431
Yang, J., & Wu, J. (2021). The impact of biometric authentication on password management. IEEE Access, 9, 75809-75818.
doi:10.1109/ACCESS.2021.3086662
Zhou, X., & Zhang, L. (2019). User behavior in password management: An analysis of empirical data. Journal of Computer Security, 27(5), 555-570. doi:10.3233/JCS-192007