Abstract:
The paper describes an analysis of methods of user account protection. A survey of user priorities when creating passwords was conducted. The pros and cons of various methods of authorization in the system are described. Based on the results of the research, a new method for generating passwords was proposed.
Keywords:password, security, user data, authentification, log-in credentials, account.