H.I. Okagbue, Z.O. Omogbadegun, F.A. Olajide, A.A. Opanuga, On Some Suggested Applications of Sudoku in Information Systems Security, Asian Journal of Information Technology, Volume 14,Issue 4, 2015, Pages 117-121, ISSN 1682-3915, ajit.2015.117.121, (https://makhillpublications.co/view-article.php?doi=ajit.2015.117.121) Abstract: This study suggested different ways the application of Sudoku can be used in defending information systems against unauthorized access, abuse, spy or disclosure. This research showed how some simple mathematical and logical manipulations of Sudoku can generate passwords or one term passwords OTP. The enormous benefits of the research and possible applications are discussed. Keywords: Sudoku;information system;authentication;security;challenge response;passwords;one time passwords;stochastic challenge response mechanism