Evolution of Password Security in Modern Computing
Delve into the historical origins of passwords, their significance in cybersecurity, and the current methods employed to safeguard digital assets. Explore the challenges posed by fast computing systems and discover innovative solutions and tools like LastPass, Keeper, and Dashlane in the realm of password management.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
Check out my new P@SsVV0rD JORDAN PETERSON DEPARTMENT OF COMPUTER SCIENCE COLORADO STATE UNIVERSITY
What is a password? CIA TRIAD Authentication Goal: Protect who can have access Confidentiality Authorization Anti-virus/DOS protection Method: Something the user knows Integrity Availability (Memorized Secret)
History of Passwords We ve been using them for a while First use: Watchword used in roman military to allow a person to enter an area. Crude way of identifying between allies and foes. Battle of Normandy Challenge and response passwords i.e. presented with the password Flash you need the correct response Thunder . Passwords were changed every 3 days MIT 1961 First computer system to implement password login.
Modern computing and passwords Other methods Computers are pretty dang fast. Spidering Attacks on passwords: (Password Cracking) Combinator Rainbow Table Fingerprint Brute Force Mask Complexity Dictionary Permutation Look under keyboard Rule-based PRINCE Many more
Generating Passwords Dumb way: Better way: Big Brain way: 1. Short password 1. Long password 1. Long as possible 2. Common words 2. Follow a rule 2. Random alpha-numeric case sensitive generator 3. Predictable 3. Change it often 3. Change it every day 4. Use it for everything 4. Confidentiality Protected!
Cracking Tools Brutus L0phtCrack RainbowCrack Aircrack-NG Wfuzz Cain and Abel John the Ripper THC Hydra Medusa OphCrack