Posts

Showing posts from October, 2021
Image
 My Presentation I have shared with you only  Sir,  If  unable kindly click on the link below   https://picits-my.sharepoint.com/:v:/g/personal/sihle_ntshotsho_pic_gov_za/Eb63fZ_T2CFGq2ecJqVR7-YBJIz3sn3GTPa5wr71unSY7w?email=miftikhar%40csu.edu.au&e=1jaEao
 AUTOMATED  BIBLIOGRAPHY AND JOURNAL SYNOPSIS CHARLES STURT UNIVERSITYITY   ITC571–EMERGING TECHNOLOGIES AND INNOVATIONTIMOTHY     SIHLE NTSHOTSHO:    Assignment Item 3:      Annotated Bibliography and Journal Synopsis   Article:1                 Walker, D. (2021). The top 12 password-cracking techniques used by hackers. Retrieved from Retrieved from https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hacke r s This article discusses the dated technique of computer user authentication and points out flaws and ways in which passwords can be compromised. It also points out how a leaked password became one of the biggest cybersecurity compromises referring to the SolarWinds compromise which at the center was a weak and easy to guess password. Holding true to the above statement of weak passwords, studies also back the assert...
Image
PROJECT PLAN    CHARLES STURT UNIVERSITY   ITC571: EMERGING TECHNOLOGY AND INNOVATION   ASSESSMENT ITEM 2: PROJECT PROPOSAL AND PLAN   STUDENT NAME: SIHLE NTSHOTSHO         Project Title: PASSWORD AS THE FORM OF AUTHENTICATION WILL SOON BECOME ABOSLETE Blog page: https://sihleitc571.blogspot.com/2021/08/     Rational • Problem Domain Traditional use of username and passwords as a form of information systems authentication fall short to thwart user account and system accounts compromise. This research will explore technologies available to harden information systems and make them more resilient again possible compromise of information and system abuse.   Purpose and justification Traditional information systems make use of usernames and passwords for system authentication, which may no longer be effective as there is substantial annual growth in computing power and the availability of free ...