THE SECURITY OF IT RESOURCES PROTECTED BY PASSWORDS

Journal Title: Scientific Journal of the Military University of Land Forces - Year 2015, Vol 178, Issue 4

Abstract

This paper presents the protection effectiveness assessment of the contents of files created using an office suite. The protection effectiveness is understood as the time required for obtaining a password blocking the access to IT resources. IT resources are files containing data of varying degrees of sensitivity. The study analysed the time it takes to crack a password for different types of information resources. It has been shown that passwords consisting of five or a smaller number of characters, and can be found in less than 1.5 hours. Such a short time needed to find the password does not guarantee the effective protection of the contents of the file. This, in turn, makes it possible to breach of confidentiality attribute of an IT resource.

Authors and Affiliations

Artur SZLESZYŃSKI, Anna WOJACZEK

Keywords

Related Articles

HISTORICAL AND LEGAL ANALYSIS OF EXCLUDING SUBORDINATE’S CRIMINAL LIABILITY FOR ACTING UNDER ORDERS OF SUPERIOR IN CRIMINAL LAW

This paper focuses on the analysis of a soldier’s criminal liability for acting under the orders of his/her superior in criminal law. The paper considers the origins of excluding a subordinate’s criminal liability with r...

ANALIZA DOŚWIADCZEŃ Z WOJNY RADZIECKO – AFGAŃSKIEJ (1978 – 1989) W ZAKRESIE ZABEZPIECZENIA LOGISTYCZNEGO

W artykule autorzy skupili się na wybranych aspektach zabezpieczenia logi-stycznego w czasie wojny radziecko - afgańskiej (1978 – 1989), dokonując jednocześnie analizy tych doświadczeń pod kątem aktualnego uczestnictwa n...

EXPANDING THE PROBLEMS OR FRUITFUL RESULTS OF SIMPLE QUESTIONS IN MATHEMATICS

In this article, three famous, ancient geometric problems (angle trisection, squaring the circle, and the Delian problem) are described as expanding mathematical prob-lems, i.e., a transition from the problems already so...

Z DZIEJÓW ORZYSKIEJ KONSPIRACJI

Przełom lat czterdziestych i pięćdziesiątych to okres wznowienia aktywności różnych grup i organizacji konspiracyjnych. Jedną z nich był „DZWON’’ - Demokra-tyczny Związek Walki o Niepodległość – organizacja, która działa...

Download PDF file
  • EP ID EP76887
  • DOI 10.5604/17318157.1200176
  • Views 61
  • Downloads 0

How To Cite

Artur SZLESZYŃSKI, Anna WOJACZEK (2015). THE SECURITY OF IT RESOURCES PROTECTED BY PASSWORDS. Scientific Journal of the Military University of Land Forces, 178(4), 109-119. https://europub.co.uk/articles/-A-76887