- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
* We can identify the following attack strategies and countermeasures: ? Offline dictionary attack: A determined hacker may bypass access controls and gain access to the system password file. The attacker then compares the password hashes against hashes of commonly used passwords. ? Specific account attack: The attacker targets a specific account and submits password guesses until the correct password is discovered. ? Popular password attack: The attacker chooses a popular password and try it against a wide range of user IDs. ? Password guessing against single user: The attacker attempts to gain knowledge about the account holder and system password policies and uses that knowledge to guess the password. ? Workstation hijacking; The attacker waits until a logged-in workstation is unattended. ? Exploiting user mistakes: If the system assigns a password, then the user is more likely to write it down because it is difficult to remember. ? Exploiting multiple password use. When different network devices share the same or a similar password for a given user. ? Electronic monitoring: If a password is communicated across a network to log on to a remote system, it is vulnerable to eavesdropping. * Countermeasures against the listed vulnerabilities include controls to: prevent unauthorized access to the password file, intrusion detection measures to identify a compromise, rapid re-issuance of passwords should the password file be compromised; account lockout mechanism which locks out access to the account after a number of failed login attempts; policies to inhibit the selection by users of common passwords; training in and enforcement of password policies that make passwords difficult to guess; automatically logging the workstation out after a period of inactivity; a policy that forbids the same or similar password on particular network devices; encrypted communications links. * A widely used password security technique is the use of hashed passwords and a salt value. Th
您可能关注的文档
- 第九章第二节南方地区.ppt
- 第九章网络服务.ppt
- 第六部分:试乘试驾.docx
- 第六单元回顾拓展.ppt
- 第六节:构造方法、静态.ppt
- 第六课-剖析从众1.ppt
- 第六套考卷159-160.doc
- 第六章 旅游地生命周期和空间竞争.ppt
- 第六章 内控-企业其他业务活动内部控制.ppt
- 第六章 育种.ppt
- 实验室危废随意倾倒查处规范.ppt
- 实验室危废废液处理设施规范.ppt
- 实验室危废处置应急管理规范.ppt
- 初中地理中考总复习精品教学课件课堂讲本 基础梳理篇 主题10 中国的地理差异 第20课时 中国的地理差异.ppt
- 初中地理中考总复习精品教学课件课堂讲本 基础梳理篇 主题10 中国的地理差异 第21课时 北方地区.ppt
- 危险废物处置人员防护培训办法.ppt
- 危险废物处置隐患排查技术指南.ppt
- 2026部编版小学数学二年级下册期末综合学业能力测试试卷(3套含答案解析).docx
- 危险废物处置违法案例分析汇编.ppt
- 2026部编版小学数学一年级下册期末综合学业能力测试试卷3套精选(含答案解析).docx
最近下载
- 2023年秋国开《管理思想史》形考作业1-4答案.pdf
- 小学一年级数学上册期末试卷(A4打印版).pdf VIP
- 旅游学概论期末考试试题及解析.docx VIP
- 自贡市餐厨垃圾处理配套设施改建项目环评报告书.pdf VIP
- 《音乐之父巴赫》课件.ppt VIP
- 【中考短语】初中英语动词固定搭配全汇总.pdf VIP
- 射频设计软件:Keysight ADS二次开发_(7).Python脚本在KeysightADS中的应用.docx VIP
- 2025年民主生活会100条核心素材.pdf VIP
- (直接打印版)苏教版小学数学一年级上册期末试卷.pdf VIP
- 酒店拆除改造工程专项拆除施工方案.docx VIP
原创力文档


文档评论(0)