29/2017 Password Selecton Guidelines and Strategies
) G+ More Next Btoge Create Blog Signin
Password Selection Guidelines and
Strategies
Monday June 20,2016 About Mo
How to select a good password? Dll Prasad Shera
i oe Fatow 206
Password Selection Strategies View my complete profi,
A password ie seqnce of characters that allows aces oa computer sytem, service or applisain. The
fot ine of defense against the eyberatacks i the ute ofthe putewod aye, where aust provide login
enfin (ID) and s password. The wr spply beth Lapin [Do determine pegs of that ser and Blog Archive
Password ides them. The password eves autenoat the ID of th nividulHoguing on hey 20469)
stern, Paswords ee unally red encrypted er han ote clea, Moat of he ayes aod sppicstons yun (1)
‘oe coptogrphic hash faction ta s message digest (MDS, o¢ SHA-I o ay enptogaphic sorts, Howto sect a good passwort?
The file ontining thee passwords hates node acess conte protections to make guessing stacks had.
The pasword selection staegy helps to ciminate gussble passwords while allowing wer 16 elect x
‘memorble password There are four asc etniqus which are ia use for sling te password
+ Compute genete passwords
User Education
“The user edition strategy tells users the inparance of wing haroqucs psewords and provides
guidelines for Slcting og pasuwords, bu it aces thei cooperation, The peoble is
+ Une mn of per and lower cse eters, numbers, pactstion and special yb
+ Dont se yourlogin mime
+ Dont se your spouse's or cls ame
telephone number, social scary numbers, te bd of your automobile, the ame ofthe sect,
+ Dont wea pasword ofl digs oth ete sme eter Thi signa dscenes he search
tine fora racket
+ Dont wea word contained in Ens or freign language ditions, pling Hits, o ote fis
ot wont
+ Use a psrword hat ety ore, t0 you dot have owl oa
+ (se pasword hat you can type icy, without having to ook a the Keyboard This makes
ade fr someone to scl you password by watching over your soul
hpspassword-selecton-guidelines blogspotint 129/2017 Password Selecton Guidelines and Strategies
Computer-generated passwords
‘Ths stegy lt emputer create pasword the password re git rtm ate, we Wil
ro be ble orem hem. ven if the password i pronounces, the wr may have ily
remembsing i and so be tempted to write it down even pooounceale aot remembered. I as
Reactive password checking
A restive pasword checking strategy tone in which he system paid an its own password
cracker find gusiable passwords, Tester cancels any password that te gussed and nts
swords enna vulnerable unl the restive pasword hocer finds thom,
Proactive password checking
‘The mos promising apeoach ingoved password secu isa proactive password checker, where @ users
slowed to slet is orher om psswor, bu he yer checks ee fi allowable and eesti mt
Posted by Dill Prasad Sharma at 3:3 AM No comments: oe
Location: Kathmandu 44600, Nepal
Home
‘Subscribe to: Posts (Atm)
Ethereal heme, Powered by Blogger.
hpspassword-selecton-guidelines blogspotinv