https://vaulted.io/library/disa-stigs-srgs/network_device_management_security_requirements_guide/V-55149?version=V2R14&compareto=V2R10
This link provides an example of a network device that must obscure feedback of authentication information. It provides a description of how to check practice and provides a fix.
https://www.youtube.com/watch?v=pZIlaWhfhpQ
This YouTube video discusses identification and authentication issues in the context of computer security.
https://www.youtube.com/watch?v=Gi-niOoVAm4
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.