?
Политическая антропология советской и постсоветской эпохи: курс лекций
Traditional password authentication systems continue to be used in enterprise distributed systems and critical infrastructures despite their vulnerabilities and growing risks. This paper provides a detailed analysis of password-related threats, including the psychological aspects of their use, technical shortcomings, institutional gaps, and non-compliance with regulatory requirements. Examples of real-world attacks, such as phishing campaigns and credential compromise in industrial networks, are considered. A special focus is placed on password protection in industrial Internet of Things (IIoT), smart grid, and infrastructure facilities. Practical recommendations for improving security are offered, including the use of multi-factor authentication, credential 136 «ЭКОНОМИКА И КАЧЕСТВО СИСТЕМ СВЯЗИ» 2/2025 rotation, the rejection of pre-set passwords, and the implementation of the Zero Trust concept.