The document discusses password security and authentication protocols. It describes how authentication protocols confirm a user's identity using something they know (a password), have (a physical token), or are (biometrics). It also outlines different methods hackers use to steal passwords, such as dictionary attacks, brute force attacks, sniffing, and phishing. Finally, it provides tips for secure passwords, including using unique usernames, multiple tiers of passwords, and a password manager.
The document discusses password security and authentication protocols. It describes how authentication protocols confirm a user's identity using something they know (a password), have (a physical token), or are (biometrics). It also outlines different methods hackers use to steal passwords, such as dictionary attacks, brute force attacks, sniffing, and phishing. Finally, it provides tips for secure passwords, including using unique usernames, multiple tiers of passwords, and a password manager.
The document discusses password security and authentication protocols. It describes how authentication protocols confirm a user's identity using something they know (a password), have (a physical token), or are (biometrics). It also outlines different methods hackers use to steal passwords, such as dictionary attacks, brute force attacks, sniffing, and phishing. Finally, it provides tips for secure passwords, including using unique usernames, multiple tiers of passwords, and a password manager.
The document discusses password security and authentication protocols. It describes how authentication protocols confirm a user's identity using something they know (a password), have (a physical token), or are (biometrics). It also outlines different methods hackers use to steal passwords, such as dictionary attacks, brute force attacks, sniffing, and phishing. Finally, it provides tips for secure passwords, including using unique usernames, multiple tiers of passwords, and a password manager.
1 Digital Basics Authentication Protocols • Security experts use the term authentication protocol to refer to any method that confirms a person’s identity using something the person knows, something the person possesses, or something the person is – A person can also be identified by biometrics, such as a fingerprint, facial features (photo), or retinal pattern – A user ID is a series of characters—letters and possibly numbers or special symbols—that becomes a person’s unique identifier – A password is a series of characters that verifies a user ID and guarantees that you are the person you claim to be
Chapter 1: Computers and
2 Digital Basics Authentication Protocols
Chapter 1: Computers and
3 Digital Basics Password Hacks • When someone gains unauthorized access to your personal data and uses it illegally, it is called identity theft • Hackers can employ a whole range of ways to steal passwords • A dictionary attack helps hackers guess your password by stepping through a dictionary containing thousands of the most commonly used passwords • The brute force attack also uses password-cracking software, but its range is much more extensive than the dictionary attack
Chapter 1: Computers and
4 Digital Basics Password Hacks • If hackers can’t guess a password, they can use another technique called sniffing, which intercepts information sent out over computer networks • An even more sophisticated approach to password theft is phishing • A keylogger is software that secretly records a user’s keystrokes and sends the information to a hacker
Chapter 1: Computers and
5 Digital Basics Password Security
Chapter 1: Computers and
6 Digital Basics Password Security • Strive to select a unique user ID that you can use for more than one site • Maintain two or three tiers of passwords
Chapter 1: Computers and
7 Digital Basics Password Security • A password manager stores user IDs with their corresponding passwords and automatically fills in login forms
Chapter 1: Computers and
8 Digital Basics Chapter 1 Complete Computers and Digital Basics