- Title
- Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
- Creator
- Vorster, Johannes, Irwin, Barry V W, van Heerden, Renier P
- Subject
- To be catalogued
- Date
- 2018
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/430324
- Identifier
- vital:72683
- Identifier
- https://researchspace.csir.co.za/dspace/bitstream/handle/10204/10919/Vorster_22337_2018.pdf?sequence=1isAllowed=y
- Description
- During the past decade, the sophistication and maturity of Enterprise-level Information Security (EIS) Standards and Systems has increased significantly. This maturity, particularly in the handling of enterprise-wide capability models, has led to a set of standards – e.g. ISO/IEC 27001, NIST 800-53, ISO/IEC 27789 and CSA CCM – that propose controls applicable to the implementation of an Information Security Manage-ment System (ISMS). By nature, the academic community is fruitful in its endeavour to propose new password schemes; and Graphical Passwords (GPs) have had many proposals for schemes. In this paper, we explore the impact of good security standards and lessons-learnt over the past decade of EID as a model of constraint on GPs schemes. The paper focuses on a number of GP schemes and points out the var-ious security constraints and limitations, if such schemes are to be im-plemented at the enterprise level.
- Format
- 6 pages, pdf
- Language
- English
- Relation
- Academic Conferences and Publishing International, Vorster, J., Irwin, B. and Van Heerden, R.P., 2018. Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design. Academic Conferences and Publishing International, Academic Conferences and Publishing International volume 2018 number 1 1 9 2018 978-1-5108-5963-0
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the Academic Conferences and Publishing International Limited Statement (https://www.academic-bookshop.com/)
- Hits: 140
- Visitors: 147
- Downloads: 9
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Violations of good security practices in graphical passwords schemes.pdf | 1 MB | Adobe Acrobat PDF | View Details Download |