tailieunhanh - Seven Deadliest Microsoft Attacks phần 2

trong an ninh thông tin cũng như trong các hình thức khác của xác thực bằng cách cung cấp một giải pháp công nghệ thấp để bảo vệ các nguồn tài nguyên mà không phải là dễ dàng có sẵn cho những người không được thẩm định hoặc trái phép, dịch vụ. | CHAPTER Windows Operating System - Password Attacks 1 INFORMATION IN THIS CHAPTER Windows Passwords Overview How Windows Password Attacks Work Dangers with Windows Password Attacks Future of Windows Password Attacks Defenses against Windows Password Attacks Passwords play an important role in information security as well as in other forms of authentication by providing a low-tech solution for protecting resources that should not be readily available to unauthenticated or unauthorized people or services. If we think about the passwords we have and the type of information they protect the importance of passwords becomes clear. For instance what if we were able to register usernames for social sites such as Twitter A Facebook B and LinkedInC without using passwords Without some sort of authentication mechanism anyone would be able to access your account data and change information without your approval. Apply the same thought process to the work environment. What if corporate resources did not require some sort of strong authentication Think about some of the most important information assets stored in your organization and what the impact could be if casual access was permitted. Military units around the world still rely on the use of verbal passwords or challenge and response verification to ensure access is granted for those who require and are authorized physical access to secure areas both in the field and in the office environments. For instance place yourself in the boots of a soldier who is assigned to a guard post during a 4-hour rotation of guard duty. During guard operations unknown individuals are challenged before being granted access to secured areas. In the field environment if an unknown individual were Ahttp 1 2 CHAPTER 1 Windows Operating System - Password Attacks to approach a soldier s guard post the soldier on guard would exclaim Halt Who goes there After the unknown individual answers the

TỪ KHÓA LIÊN QUAN