Find Sporting Goods on eBay
Video and Audio], Broadcasting and podcasting Real Time Media On The Net

[description], Story, any other text you want to use.

Open Sesame - Password Security

 by: Terrence F. Doheny

"Open Sesame!" is probably the most famous password in literature. It gave Ali Baba access to vast treasure. In the realm of technology, computer passwords also give access to valuable treasures: precious business and personal data.

Information about your personal life, buying habits, credit quality and life style is valuable to those who can profit from it. For the Corporation, information has even greater worth. It is not the "Bricks and Mortar" but the intangibles such as intellectual property, client lists, market strategies, pricing and compensation that account for over half the value of the modern enterprise.

All of this personal and business data most likely resides on a database somewhere and is available with a password. In fact, passwords are the most common means of entry in any system. They are also acknowledged as the most vulnerable points for security. "Weak" or compromised passwords are the easiest way for hackers to gain entry into a system.

Simple or short passwords can be easily discovered through "brute force" or "dictionary" attacks which concentrate intense computer power to crack a password. A two letter password, for example, has only 676 combinations. A password with eight letters offers more safety with 208,000,000 combinations.

Ideally, a password should consist of 8 or more characters. They should also contain a mixture of upper and lower case letters, symbols and numbers. "A$d3B5i9X" would be an example. Microsoft security has encouraged the concept of the "Pass Phrase" as an alternative. A phrase such as,"TheLastGoodBookUBoughtCost$25!" has all of the needed elements and is also easy to remember.

The human factor or social engineering contributes to password compromises. It is estimated that employees share their password eight times a year. Passwords can also be cajoled from untrained or naïve workers. The standard rule is NEVER share a password.

Remember the cliché of the "Six Degrees of Separation." You cannot know who will eventually end up with your password and own it.

To cope with these issues, many leading edge firms are adopting a defense in depth strategy utilizing three elements to better safeguard their information

The three layers of authentication consist of:

What you know…


A strong password or pass phrase

What you have…


A Crypto-key, smart card or token

Who you are…


A biometric aspect such as fingerprint, hand, or retinal recognition

Usage of these three defensive measures will increase dramatically in the future as people seek to thwart ever increasing threats to their private and personal information. Many companies will be mandating them as a significant part of their security best-practices to safeguard an extremely valuable asset: their treasured data.

About The Author

Terrence F. Doheny President of Beyond If Solutions, LLC.


www.beyondifsolutions.com


terry@beyondifsolutions.com

© 2004, Terrence F. Doheny


xm radio

Real Time Media On The Net
This is one of the best resources for information on Real Time Media On The Net you can possibly find. Follow our links to find more information on Real Time Media On The Net. We hope that we have all of the Real Time Media On The Net details that you could need.
Real Time Media On The Net

While the threat from hackers is low for individuals, a more serious threat to personal privacy comes from unscrupulous xm radio companies that operate websites for quick quids. Many xm radio sites require you to register before you can use its services. Often you must provide personal information, such as your name, street address, and e-mail address. Then as you browse the site, data is collected as to which pages you visited, how long you remained on each page, the links you clicked, what terms you searched, and so on. After a number of visits to the site, a personal profile emerges. The question is, what do xm radio site operators do with this information?

Most claim that they use it to personalize your experience on the site. For instance, if a xm radio site learns that you are interested in xm radio, the next time you visit the site, you might be presented with an article or advertisements for that and related products. But some xm radio websites sell this information to marketers, which means that you may find yourself receiving unwanted catalogs from garden suppliers. Our preferred retailer does not do this.

Main Menu
Real Time Media On The Net
Site Map

Affiliate Ads, Links, news, etc.

News for 09-May-25

Source: BBC News - Home
Your pictures

Source: BBC News - Home
Rockettes set for Trump inauguration

Source: BBC News - Home
Sri Lankan court acquits five men in Tamil MP murder trial

Source: BBC News - Home
May Christmas message urges unity after Brexit vote

Source: BBC News - Home
Libya Malta hijack: Hijackers arrested as drama ends peacefully

Source: BBC News - Home
George North: World Rugby wants more information from RFU over 'non-compliance'

Source: BBC News - Home
Man 'in love' drives through airport

Source: BBC News - Home
Kim Ghattas: Trump's Syria conundrum

Source: BBC News - Home
The technology of touch

Source: BBC News - Home
Syrian girl with severe burns gets life-changing surgery


Links
Links
Links
Google

Take Medicine Correctly | MD Newscast | Take It Right | Take It Correctly
Copyright © 2005. Name of Site here. Last Updated: Friday, 09-May-2025 00:03:03 MDT.
fantasy-sports-directory   Medical Newscast   Talk On The Net