Passwords: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
 
(11 intermediate revisions by the same user not shown)
Line 5: Line 5:
----
----
<br>
<br>
Other identification methods are mentioned in [[II.Basic Concepts]].
Other identification methods are mentioned in [[Passwords - Basic Concepts|Basic Concepts on Passwords]].
<br><br>A further introduction is available [[Passwords - Introduction|here]].
<br><br>
For further information on the topic passwords, please follow:
For detailed information on the topic passwords, please follow the [[Passwords - Table of Contents|Table of Contents]].
<br><br>
'''Table Of Contents:'''<br>
[[1. Introduction to Passwords]]<br>
[[2. Basic Concepts]]<br>
[[3. Psychology Issues on Passwords]]<br>
[[3.1 Social Engineering]]<br>
[[3.2 Reliable Password Entry]]<br>
[[3.3 Remembering the Password]]<br>
[[4. Design Errors & Operational Issues]]<br>
[[5. System Issues]]<br>
[[5.1 Protecting Oneself or Others?]]<br>
[[5.2 Intrusion Detection Issues]]<br>
[[5.3 Can Users be Trained?]]<br>
[[5.4 Growing Need for Security Data]]<br>
[[6. Attacks on Passwords / Protection of Passwords]]<br>

Latest revision as of 18:44, 8 November 2004

Passwords are special phrases or combinations of letters, signs and numbers used to authenticate one user on a system.

They represent in an identification process the state of providing secret information to the system, so that access can be granted for the desired user. (shortly described as 'something you know').



Other identification methods are mentioned in Basic Concepts on Passwords.

A further introduction is available here. For detailed information on the topic passwords, please follow the Table of Contents.