Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Password

Handbook of Research on Emerging Developments in Data Privacy
A secret word known only to the individual and computer systems created proven a person’s identity and grant them access to a system.
Published in Chapter:
Social Engineering Techniques, Password Selection, and Health Care Legislation: A Health Care Setting
B. Dawn Medlin (Appalachian State University, USA) and Joseph A. Cazier (Appalachian State University, USA)
Copyright: © 2015 |Pages: 15
DOI: 10.4018/978-1-4666-7381-6.ch005
Abstract
Healthcare employees generally have access to view hospital patient's medical records. This access can be simply viewing their chart or reviewing information on a computer screen. With this type of accessibly, hospital employees have the opportunity to view diagnosis, personal medical histories, as well as demographic information such as age and gender. Social engineers can use methods such as familiarity with co-workers for instance to obtain this information from unsuspecting health care workers. In addition, weak password selection can provide opportunities for a wealth of information to be stolen. In this chapter, current security legislation that addresses the security of patient's health care records, social engineering tactics, and passwords are explored.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Authentication Methods for Computer Systems Security
Knowledge-based authentication consisting of a secret series of characters according to predefined rules. It is the most widely used mechanism of authentication.
Full Text Chapter Download: US $37.50 Add to Cart
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Secret piece of data that is used in conjunction with a username to access private content or privileged systems.
Full Text Chapter Download: US $37.50 Add to Cart
Organizational Password Policy
An authorized word or sequence of characters that a user must enter as input in order to log on to a computer system and gain access to desired resources.
Full Text Chapter Download: US $37.50 Add to Cart
Guarding Corporate Data from Social Engineering Attacks
A secret word used to verify a person is authorized to access a system.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Practices from Passwords to Biometrics
Knowledge-based authentication mechanism consisting of a secret series of characters according to predefined rules. It is the most widely-used mechanism of authentication.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR