AUTOMATED BIBLIOGRAPHY AND JOURNAL SYNOPSIS CHARLES STURT UNIVERSITYITY ITC571–EMERGING TECHNOLOGIES AND INNOVATIONTIMOTHY SIHLE NTSHOTSHO: Assignment Item 3: Annotated Bibliography and Journal Synopsis Article:1 Walker, D. (2021). The top 12 password-cracking techniques used by hackers. Retrieved from Retrieved from https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hacke r s This article discusses the dated technique of computer user authentication and points out flaws and ways in which passwords can be compromised. It also points out how a leaked password became one of the biggest cybersecurity compromises referring to the SolarWinds compromise which at the center was a weak and easy to guess password. Holding true to the above statement of weak passwords, studies also back the assert...