第三讲密钥分配和用户认证分解.ppt

* We can identify the following attack strategies and countermeasures: ? Offline dictionary attack: A determined hacker may bypass access controls and gain access to the system password file. The attacker then compares the password hashes against hashes of commonly used passwords. ? Specific account attack: The attacker targets a specific account and submits password guesses until the correct password is discovered. ? Popular password attack: The attacker chooses a popular password and try it against a wide range of user IDs. ? Password guessing against single user: The attacker attempts to g

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档