The aim of the article is to systematise the methods of securing static passwords stored in IT systems. Pros and cons of those methods are presented and conclusions as a recommendation for IT system designers are proposed. At the beginning, the concept of cryptographic hash function is presented, following discussion of methods of storing passwords showing their evolution and susceptibility to modern attacks. Results of research on masked passwords of Polish banks IT systems are presented, as well as the most interesting examples of adaptive password functions are given. Then, the systematisation of password protection methods was carried out. Finally, the directions for further research are indicated. Keywords: computer security, password, authentication, hash function
Differences in approach to IT support within one of the most important organization is astonishing. Within less than two decades it had transformed from local support based on a local IT components and local policies of support as well as local standards throughout the one consolidated approach based on a best practices taken from commercial market-ITIL, where IT support started to be defined for a whole organization, services became clearly defined, used had become the most important in the chain of support, standards became common for the NATO-not for one Headquarter from NATO, finishing on a FMN-environment in which exchange of information within allied forces is possible in a real time… these are the most important changes taking place in front of our eyes. The approach to the IT support and usage had finally changed from situation in which IT was treated as some kind of a less important tool to improve the way of day-today work to the main solution/environment that gives possibility to rapidly improve the availability of knowledge everywhere it is needed in a time. That knowledge nowadays may mean thousands of lives of people if we take into consideration kind of activity that NATO is prepared for. Therefore, there is a strong need to keep the direction of implementation the latest solutions to permanently improve IT within military organization. That is also very interesting to take lessons learned from that kind of organizations and try to adjust them to civilian environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.