Passwords - Can Users be Trained: Difference between revisions
No edit summary |
No edit summary |
||
Line 21: | Line 21: | ||
- A password which seems to be a random combination<br> |
- A password which seems to be a random combination<br> |
||
<br> |
<br> |
||
'' '''Mentioning a good way to create passwords:''' '' |
'' '''Mentioning a good way to create passwords:''' ''<br> |
||
Using mnemonic phrases such as ''I’s12n&Iah'' retrieved from the sentence: '''“It’s 12 noon and I am hungry”''' |
Using mnemonic phrases such as ''I’s12n&Iah'' retrieved from the sentence: '''“It’s 12 noon and I am hungry”''' |
||
Line 29: | Line 29: | ||
- : problem of user compliance<br><br> |
- : problem of user compliance<br><br> |
||
'' '''Another way''' '': |
'' '''Another way''' '':<br> |
||
Randomly created and centrally assigned passwords (e.g. as used in military purposes) |
Randomly created and centrally assigned passwords (e.g. as used in military purposes) |
||
Revision as of 21:51, 8 November 2004
Finally the teaching of users to choose good passwords and giving negative feedback if not is essentially on that topic.
Conditions for creating good passwords:
Never use:
- Computer name, account name, hostnames
- Any names.
- The license number of your car
- Telefon numbers
- Birthdays
- Words, which are in any dictionaries
- Simple charakter combination ... abcd, 1234
- Keyboard patterns ... qwertz
- All of the variations above reversly
- NCC-1701D is not a good choice
Use instead:
- At least 8 signs
- Letters (small and big) + numbers + special signs
- A password which seems to be a random combination
Mentioning a good way to create passwords:
Using mnemonic phrases such as I’s12n&Iah retrieved from the sentence: “It’s 12 noon and I am hungry”
+ : easy to remember as naively selected passwords and as hard to guess as random passwords
- : problem of user compliance
Another way :
Randomly created and centrally assigned passwords (e.g. as used in military purposes)
+ : they guarantee a certain quality
- : built from an algorithm and not strictly random, some people will write it down, because it is not easy to keep in mind
Back (Intrusion Detection Issues) | Table of Contents | Next (Growing Need For Security Data)