The paper presents the results of research on the implementation of password protection as a way to ensure information security. The varieties of passwords used in practice (user-set passwords, system-generated passwords, half-words, key phrases, interactive “question-answer” sequences) are considered, their advantages and disadvantages are analyzed with illustrative examples. Taking into account the current regulatory documents, recommendations on the formation of strong user passwords and actions of information security specialists to maintain the relevance and functionality of password protection are proposed. Using the high-level programming language C++, various variants of the password verification process that can be implemented in corporate information systems are discussed in detail. In addition to full source codes of computer programs, detailed comments on the logic of their functioning are given.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.