Sponsored by ComputerWeekly.com
Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords. Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy. Access >>>
Table of contents
- The password cracking toolbox
- The study of password selection patterns
- The proof-of-concept attack
More Premium Content Accessible For Free
The 2014 State of Digital Transformation
The essence of digital transformation comes down to people, this report extract from analyst group Altimeter reveals.
Gartner: How CIOs should prepare for optimising IT in the digital economy
Gartner analyst Michael Smith argues that CIOs should adopt a dual approach to supporting the enterprise’s transformation to the digital economy.
Gartner: The rise of the chief data officer and what it means for IT leaders
CIOs should view the Chief Data Officer as a peer and a partner who will enable them to focus on the job they already have, says Gartner analyst ...