Book description
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
* Examines the password problem from the perspective of the administrator trying to secure their network
* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot
* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
Table of contents
- Cover
- Front Matter (1/2)
- Front Matter (2/2)
- Contents (1/2)
- Contents (2/2)
- Chapter 1: Passwords: The Basics and Beyond (1/2)
- Chapter 1: Passwords: The Basics and Beyond (2/2)
- Chapter 2: Meet Your Opponent (1/3)
- Chapter 2: Meet Your Opponent (2/3)
- Chapter 2: Meet Your Opponent (3/3)
- Chapter 3: Is Random Really Random? (1/4)
- Chapter 3: Is Random Really Random? (2/4)
- Chapter 3: Is Random Really Random? (3/4)
- Chapter 3: Is Random Really Random? (4/4)
- Chapter 4: Character Diversity: Beyond the Alphabet (1/3)
- Chapter 4: Character Diversity: Beyond the Alphabet (2/3)
- Chapter 4: Character Diversity: Beyond the Alphabet (3/3)
- Chapter 5: Password Length: Making It Count (1/4)
- Chapter 5: Password Length: Making It Count (2/4)
- Chapter 5: Password Length: Making It Count (3/4)
- Chapter 5: Password Length: Making It Count (4/4)
- Chapter 6: Time: The Enemy of All Secrets (1/2)
- Chapter 6: Time: The Enemy of All Secrets (2/2)
- Chapter 7: Living with Passwords (1/4)
- Chapter 7: Living with Passwords (2/4)
- Chapter 7: Living with Passwords (3/4)
- Chapter 7: Living with Passwords (4/4)
- Chapter 8: Ten Password Pointers: Building Strong Passwords (1/3)
- Chapter 8: Ten Password Pointers: Building Strong Passwords (2/3)
- Chapter 8: Ten Password Pointers: Building Strong Passwords (3/3)
- Chapter 9: The 500 Worst Passwords of All Time (1/2)
- Chapter 9: The 500 Worst Passwords of All Time (2/2)
- Chapter 10: Another Ten Password Pointers Plus a Bonus Pointer (1/2)
- Chapter 10: Another Ten Password Pointers Plus a Bonus Pointer (2/2)
- Chapter 11: The Three Rules for Strong Passwords
- Chapter 12: Celebrate Password Day
- Chapter 13: The Three Elements of Authentication (1/2)
- Chapter 13: The Three Elements of Authentication (2/2)
- Appendix A: Test Your Password
- Appendix B: Random Seed Words (1/5)
- Appendix B: Random Seed Words (2/5)
- Appendix B: Random Seed Words (3/5)
- Appendix B: Random Seed Words (4/5)
- Appendix B: Random Seed Words (5/5)
- Appendix C: Complete Randomness (1/4)
- Appendix C: Complete Randomness (2/4)
- Appendix C: Complete Randomness (3/4)
- Appendix C: Complete Randomness (4/4)
- Index (1/2)
- Index (2/2)
Product information
- Title: Perfect Password
- Author(s):
- Release date: January 2006
- Publisher(s): Syngress
- ISBN: 9780080489513
You might also like
video
Hands-On Password Attacks and Security
Passwords have become the top authentication factor in today’s world. You use it in combination with …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Cyber Breach Response That Actually Works
You will be breached—the only question is whether you'll be ready A cyber breach could cost …
book
Preventing Good People from Doing Bad Things: Implementing Least Privilege
In today's turbulent technological environment, it's becoming increasingly crucial for companies to know about the principle …