Password protection in IT systems

The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed. At the beginning, the concept of cryptographic hash function is presented, fo...

Full description

Bibliographic Details
Main Authors: Przemysław Rodwald, Bartosz Biernacik
Format: Article
Language:English
Published: Wojskowa Akademia Techniczna, Redakcja Wydawnictw WAT, ul. gen. S. Kaliskiego 2, 00-908 Warszawa 2018-04-01
Series:Biuletyn Wojskowej Akademii Technicznej
Subjects:
Online Access:http://biuletynwat.pl/gicid/01.3001.0011.8036