- 1、本文档共86页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
* Countermeasures against the listed vulnerabilities include controls to: prevent unauthorized access to the password file, intrusion detection measures to identify a compromise, rapid re-issuance of passwords should the password file be compromised; account lockout mechanism which locks out access to the account after a number of failed login attempts; policies to inhibit the selection by users of common passwords; training in and enforcement of password policies that make passwords difficult to guess; automatically logging the workstation out after a period of inactivity; a policy that forbids the same or similar password on particular network devices; encrypted communications links. * A widely used password security technique is the use of hashed passwords and a salt value. This scheme is found on virtually all UNIX variants as well as on a number of other operating systems. The procedure shown here in Figure 3.1a from the text is used. To load a new password into the system, the user selects or is assigned a password.This password is combined with a fixed-length salt value (so the same user password can create multiple hash values, depending on which salt is used. to make attacks harder). In older implementations, the salt is related to the time the password is assigned to the user. Newer implementations use a pseudorandom or random number. The password and salt serve as inputs to a hashing algorithm to produce a fixed-length hash code. The hash algorithm is designed to be slow to execute to thwart attacks. The hashed password is then stored, together with a plaintext copy of the salt, in the password file for the corresponding user ID. The hashed-password method has been shown to be secure against a variety of cryptanalytic attacks. When a user attempts to log on to a system, the user provides an ID and a password (as shown in Figure 3.1b). The operating system uses the ID to index into the password file and retrieve the plaintext salt and the encrypted passwor
您可能关注的文档
- 第三部分 论述类文本阅读讲解.ppt
- 标志设计基础讲解.ppt
- 标准的编写规范 GBT1.1-2009讲解.ppt
- 科密IC卡一卡通售饭系统方案讲解.doc
- 标准化工程师考试题讲解.doc
- 第三部分商务交往中的常用公务礼仪(礼仪)讲解.ppt
- 标准化管理制度装订成册讲解.doc
- 冶金137班韩伟善废钢铁回收与利用剖析.pptx
- 冶金等工贸企业安全生产标准化基本规范剖析.doc
- 冶金工程毕业论文范文剖析.docx
- 2025年株洲市广播电视台招聘高层次人才(1人)考前自测高频考点模拟试题及答案详解参考.docx
- 2025年天津市北辰医院招聘高级专业技术人员(1人)考前自测高频考点模拟试题附答案详解(突破训练).docx
- 2025年度中国地质环境监测院(自然资源部地质灾害技术指导中心)模拟试卷完整参考答案详解.docx
- 2025年广西百色西林县八达镇人民政府招聘村级财务会计委托代理服模拟试卷含答案详解(模拟题).docx
- 2025年广西河池罗城特聘农机技术指导员的(1人)笔试备考试题及答案详解(易错题).docx
- 2025年广西金融职业技术学院招聘高级职称人才(11人)笔试备考试题含答案详解(最新).docx
- 2025年大庆高新区招聘劳务派遣制人员招聘(15人)模拟试卷附答案详解(考试直接用).docx
- 2025年嫩江市招聘农垦社区工作者(88人)模拟试卷及一套完整答案详解.docx
- 2025年天津市北辰医院招聘高级专业技术人员(1人)模拟试卷附答案详解(培优a卷).docx
- 2025年度中央机关及其直属机构补充录用公务员报名即将开始笔试备考试题及答案详解一套.docx
文档评论(0)