Easy to Remember, Hard to Guess: A Password Generation Tool for the Digital Age
Downloads
A brute force attack is a common method used by cybercriminals to gain unauthorized access to user accounts. It is essential for individuals and organizations to take proactive measures to protect themselves from such attacks. One way to do this is by improving their knowledge of cybersecurity and implementing measures to safeguard their online presence. Using programming languages like Python and web-frameworks like Django, websites can be developed to help individuals generate secure and memorable passwords that align with the latest password security standards. This can help anyone who wants to improve their password security, irrespective of whether they have been a victim of a cyber-attack or not.
Downloads
Google. (n.d.). Manage your Google Account password. [Online]. Available: https://passwords.google.com/options?ep=1. [Accessed: Apr. 19, 2023].
J. Miller and Z. Snyder, "Innocuous Facebook Quizzes: Attacker Intel Goldmines," ZeroFOX, 2016. [Online]. Available: https://www.zerofox.com/blog/innocuous-facebook-quizzes-attacker-intel-goldmines/. [Accessed: May 06, 2023]
Sadat, S. E., Hedayathllah, H., & Ahamadzai, N. (2023). Highly Secure and Easy to Remember Password-Based Authentication Approach. Journal for Research in Applied Sciences and Biotechnology, 2(1), 18-25. DOI: 10.55544/jrasb.2.1.18. [Accessed: Apr. 19, 2023].
University Admissions. (n.d.). Log in. [Online]. Available: https://www.universityadmissions.se/intl/login. [Accessed: Mar. 20, 2023].
HackRead. (2019, Feb. 8). People use their names as passwords: Study. [Online]. Available: https://www.hackread.com/people-use-their-names-passwords-study/. [Accessed: Apr. 20, 2023].
Georgetown University. (2020, Oct. 27). Password size matters. [Online]. Available: https://security.georgetown.edu/csam-2020/password-size-matters/. [Accessed: Apr. 20, 2023].
Google. (n.d.). Create a strong password. [Online]. Available: https://support.google.com/accounts/answer/32040?hl=en. [Accessed: Apr. 23, 2023].
Cybersecurity and Infrastructure Security Agency. (2022, Mar. 10). Choosing and protecting passwords. [Online]. Available: https://www.cisa.gov/news-events/news/choosing-and-protecting-passwords. [Accessed: Apr. 23, 2023].
Reader's Digest. (n.d.). Passwords hackers can guess first. [Online]. Available: https://www.rd.com/article/passwords-hackers-guess-first/. [Accessed: Apr. 23, 2023].
Techzine. (2022, Mar. 2). Most people still use the same password for multiple accounts. [Online]. Available: https://www.techzine.eu/news/security/74094/most-people-still-use-the-same-password-for-multiple-accounts/. [Accessed: Apr. 23, 2023].
NordPass. (n.d.). Most common passwords list. [Online]. Available: https://nordpass.com/most-common-passwords-list/. [Accessed: Apr. 23, 2023].
Security.org. (2022, Mar. 18). How secure is my password? [Online]. Available: https://www.security.org/how-secure-is-my-password/. [Accessed: Apr. 23, 2023].
Capital One, "Facts 2019," Capital One, [Online]. Available: https://www.capitalone.com/digital/facts2019/. [Accessed: Apr. 24, 2023].
ERMProtect, "Top 10 Data Breaches So Far in 2022," ERMProtect, [Online]. Available: https://ermprotect.com/blog/top-10-data-breaches-so-far-in-2022/. [Accessed: Apr. 24, 2023].