SlideShare une entreprise Scribd logo
1  sur  10
SECURE PASSWORD
PREPARED BY :- SUPAN SHAH
7383216267
PASSWORD :-
APasswordissecretwordorstringof characters
thatisusedfor authentication.
 User Perspective :-
 How to choose a “ secure “ password ?
 Developer Perspective :-
 How to store a password in a secure way ?
Why Are Passwords Important ?
 Passwords are cheap to deploy, but also act as the first
line of defense in a security arsenal.
Examples of What They Protect :-
 ATMs and bank accounts
 Nuclear power and other critical infrastructure
systems
 Company proprietary information and systems
 Email accounts (Gmail, Hotmail, Yahoo, AOL, etc.)
 Student information
Passwords & Authentication
 Passwords have been used for centuries, e.g. guards and
sentries.
 Passwords = secret authentication code used for access.
 Answers the question: How do you prove to someone
that you are who you claim to be?
Authentication Methods :-
 What you know (Passwords, Secret keys)
 Where you are (IP Addresses)
 What you are (Biometrics)
 What you have (Secure tokens)
AAA of Password Security:-
 Authentication (& Identification)
 Establishes that the user is who they say they are
(credentials).
 Authorization
 The process used to decide if the authenticated
person is allowed to access specific information or
functions.
 Access Control
 Restriction of access (includes authentication &
authorization)
Passwords
ImpactonSecurity
• Simple hacking tools are available to anyone who
looks for them on the Internet.
• Tools such as LOphtCrack allow admittance into
almost anyone's account if a simple eight-digit
password is used.
People are afraid when they learn that using only an eight-digit
password with standard numbers and letters will allow anyone to
figure out their passwords in less than two minutes when one
downloads a publicly available tool like LOphtCrack from the
Internet. This was the kind of tool which we found
(in Al Qaeda’s arsenal), nothing terribly sophisticated.
- Richard Clark, Presidents Advisor on Cyber Security (2001-2003)
• Sometimes even hacking tools aren’t even necessary
• Disclosure
• Voluntary disclosure of information
• Inadequate guarding of system passwords
• Inference
• Known pattern to creation of passwords
• Use of generated passwords with predictable algorithm
• Exposure
• Accidental release of password
• Loss
• Forgetting to remember passwords
• Can lead to creation of easy passwords
Passwords
Threats to Password Security, Part 1
• Snooping/Eavesdropping
• Keyloggers
• Network sniffing (intercepting of network
communication where a password is submitted)
• Guessing
• Limited amount of choices which can be figured out
through process of elimination
• Use of blank/common passwords, passwords which
can be figured out by knowing name of relatives,
pets, etc.
• Cracking
• Automated “guessing”
Passwords
Threats to Password Security, Part 2
Passwords
Why Cracking is Possible
• Passwords are NOT truly random
– 52 upper/lowercase letters, 10 digits, and 32
punctuation symbols equals  6 quadrillion possible 8-
character passwords
– People like to use dictionary words, relative and pet
names equaling  1 million common passwords
– On average, each person has 8-12 passwords:
– Different systems impose different password
requirements.
– Passwords need to be changed often.
– Some passwords are only used occasionally.
THANK YOU

Contenu connexe

Tendances

Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Password Management
Password ManagementPassword Management
Password ManagementRick Chin
 

Tendances (20)

Brute force attack
Brute force attackBrute force attack
Brute force attack
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cyber security
Cyber security Cyber security
Cyber security
 
Application Security
Application SecurityApplication Security
Application Security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
User authentication
User authenticationUser authentication
User authentication
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Password Management
Password ManagementPassword Management
Password Management
 
Social engineering
Social engineering Social engineering
Social engineering
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 

Similaire à Secure password - CYBER SECURITY

Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thsamirapdcosden
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
password.ppt
password.pptpassword.ppt
password.pptKaxa5
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Fego Ogwara
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization OnMaximaSheffield592
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesPeter Wood
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfaoneonlinestore1
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
SecurityBasics.ppt
SecurityBasics.pptSecurityBasics.ppt
SecurityBasics.pptssuser7ec6af
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 

Similaire à Secure password - CYBER SECURITY (20)

Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
password.ppt
password.pptpassword.ppt
password.ppt
 
Passwords
PasswordsPasswords
Passwords
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security Vulnerabilities
 
Password Problem - Solved!
Password Problem - Solved!Password Problem - Solved!
Password Problem - Solved!
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Password hacking
Password hackingPassword hacking
Password hacking
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
SecurityBasics.ppt
SecurityBasics.pptSecurityBasics.ppt
SecurityBasics.ppt
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 

Dernier

Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Dernier (20)

Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

Secure password - CYBER SECURITY

  • 1. SECURE PASSWORD PREPARED BY :- SUPAN SHAH 7383216267
  • 2. PASSWORD :- APasswordissecretwordorstringof characters thatisusedfor authentication.  User Perspective :-  How to choose a “ secure “ password ?  Developer Perspective :-  How to store a password in a secure way ?
  • 3. Why Are Passwords Important ?  Passwords are cheap to deploy, but also act as the first line of defense in a security arsenal. Examples of What They Protect :-  ATMs and bank accounts  Nuclear power and other critical infrastructure systems  Company proprietary information and systems  Email accounts (Gmail, Hotmail, Yahoo, AOL, etc.)  Student information
  • 4. Passwords & Authentication  Passwords have been used for centuries, e.g. guards and sentries.  Passwords = secret authentication code used for access.  Answers the question: How do you prove to someone that you are who you claim to be? Authentication Methods :-  What you know (Passwords, Secret keys)  Where you are (IP Addresses)  What you are (Biometrics)  What you have (Secure tokens)
  • 5. AAA of Password Security:-  Authentication (& Identification)  Establishes that the user is who they say they are (credentials).  Authorization  The process used to decide if the authenticated person is allowed to access specific information or functions.  Access Control  Restriction of access (includes authentication & authorization)
  • 6. Passwords ImpactonSecurity • Simple hacking tools are available to anyone who looks for them on the Internet. • Tools such as LOphtCrack allow admittance into almost anyone's account if a simple eight-digit password is used. People are afraid when they learn that using only an eight-digit password with standard numbers and letters will allow anyone to figure out their passwords in less than two minutes when one downloads a publicly available tool like LOphtCrack from the Internet. This was the kind of tool which we found (in Al Qaeda’s arsenal), nothing terribly sophisticated. - Richard Clark, Presidents Advisor on Cyber Security (2001-2003) • Sometimes even hacking tools aren’t even necessary
  • 7. • Disclosure • Voluntary disclosure of information • Inadequate guarding of system passwords • Inference • Known pattern to creation of passwords • Use of generated passwords with predictable algorithm • Exposure • Accidental release of password • Loss • Forgetting to remember passwords • Can lead to creation of easy passwords Passwords Threats to Password Security, Part 1
  • 8. • Snooping/Eavesdropping • Keyloggers • Network sniffing (intercepting of network communication where a password is submitted) • Guessing • Limited amount of choices which can be figured out through process of elimination • Use of blank/common passwords, passwords which can be figured out by knowing name of relatives, pets, etc. • Cracking • Automated “guessing” Passwords Threats to Password Security, Part 2
  • 9. Passwords Why Cracking is Possible • Passwords are NOT truly random – 52 upper/lowercase letters, 10 digits, and 32 punctuation symbols equals  6 quadrillion possible 8- character passwords – People like to use dictionary words, relative and pet names equaling  1 million common passwords – On average, each person has 8-12 passwords: – Different systems impose different password requirements. – Passwords need to be changed often. – Some passwords are only used occasionally.