This study suggested different ways the application of Sudoku can be used in defending information systems against unauthorized access, abuse, spy or disclosure. This research showed how some simple mathematical and logical manipulations of Sudoku can generate passwords or one term passwords OTP. The enormous benefits of the research and possible applications are discussed.
H.I. Okagbue, Z.O. Omogbadegun, F.A. Olajide and A.A. Opanuga. On Some Suggested Applications of Sudoku in Information Systems Security.
DOI: https://doi.org/10.36478/ajit.2015.117.121
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2015.117.121