Реферат: Network Security Essay Research Paper 10 INTRODUCTION

(By Ziff-Davis TV Inc, http://www.zdnet.com/zdtv/cybercrime/spyfiles/jump/0,3698,2127639,00.html information collected on 22/02/99)

Appendix B

Good password means difficult to guess, have both UppEr case and loWeR case letters contain special characters and numbers such as #109$28%G8, it should be easy to remember so users do not need to write anywhere, more than six characters long, it should be typed quickly. So some body wouldn t notice what the user types by looking the keyboard.

Good passwords also include some techniques such as

1) If there are too short words can be combined with a special character or number such as eye-brow .

2) Substitution of numbers for letters such as g1n0la instead of ginola .

The characteristic of bad passwords

1) Persons name or spouse s, parents, pet s, child s, friends, boss s and any bodies name.

2) A word in the English dictionary or a place.

3) Passwords of all same letters and it should always differ from login name and old password.

4) Never change back to the initial password assigned by the computer services for example IT-Centre. (http://www.8j.net/local_forms/passwd.html)

Appendix C

“Public keys are a common use of asymmetric keys. Though secret keys are easy enough to implement between two users, what if we need to contact many different users, and all of the messages need to be encrypted? It is inefficient to call each person, and make up a new secret key, for each transmission. These calls also jeopardise key security”. (Beyda, 1996)

К-во Просмотров: 169
Бесплатно скачать Реферат: Network Security Essay Research Paper 10 INTRODUCTION