Passwords - Growing Need for Security Data: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
'''''The main question on all these previous issues:'''''<br><br> |
'''''The main question on all these previous issues:'''''<br><br> |
||
Line 7: | Line 6: | ||
Further authorization through smartcards or mobile phones may generate |
Further authorization through smartcards or mobile phones may generate |
||
new problems concerning the security of used protocols. |
new problems concerning the security of used protocols.<br><br> |
||
---- |
|||
[[Passwords - Can Users be Trained|Back (Can Users Be Trained?)]] | [[Passwords - Table of Contents|Table of Contents]] | [[Passwords - Attacks And Protection|Next (Attacks On & Protection of Passwords)]] |
Latest revision as of 22:02, 8 November 2004
The main question on all these previous issues:
Will users compromise their passwords by using them on other systems?
There is a high probability and even if the users are given (unchangeable)
random passwords, they are going to write it down sooner or later.
Further authorization through smartcards or mobile phones may generate
new problems concerning the security of used protocols.
Back (Can Users Be Trained?) | Table of Contents | Next (Attacks On & Protection of Passwords)