Passwords - Growing Need for Security Data: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
 
No edit summary
 
Line 1: Line 1:

'''''The main question on all these previous issues:'''''<br><br>
'''''The main question on all these previous issues:'''''<br><br>


Line 7: Line 6:


Further authorization through smartcards or mobile phones may generate
Further authorization through smartcards or mobile phones may generate
new problems concerning the security of used protocols.
new problems concerning the security of used protocols.<br><br>


----
[[Passwords - Can Users be Trained|Back (Can Users Be Trained?)]] | [[Passwords - Table of Contents|Table of Contents]] | [[Passwords - Attacks And Protection|Next (Attacks On & Protection of Passwords)]]

Latest revision as of 22:02, 8 November 2004

The main question on all these previous issues:

Will users compromise their passwords by using them on other systems?
There is a high probability and even if the users are given (unchangeable) random passwords, they are going to write it down sooner or later.

Further authorization through smartcards or mobile phones may generate new problems concerning the security of used protocols.



Back (Can Users Be Trained?) | Table of Contents | Next (Attacks On & Protection of Passwords)