Password Cracking:
- Brute force attacks: Trying every possible combination of characters.
- Dictionary attacks: Using words from dictionaries or newspapers.
- Rainbow attacks: Using pre-computed tables of hashes.
Hashing:
- A one-way algorithm that converts a password into a fixed-length hash.
- Used to store passwords securely.
- Can be vulnerable to rainbow table attacks if the same hashing algorithm is used widely.
Strong Passwords:
- Minimum length: 12 characters or more.
- Complexity: Mix of upper/lowercase letters, numbers, and special characters.
- Uniqueness: A different password for each account.
- Regular changes: Mandatory changes every 6-12 months.
- Avoidance: Don't use personal information, dictionary words, or common phrases.
Password Policies:
- Set of rules: Guidelines for creating and using strong passwords.
- Requirements: Minimum length, complexity, uniqueness, regular changes, employee training.
- Prohibitions: Reusing passwords, sharing passwords, writing passwords down, storing passwords digitally.
Additional Tips:
- Avoid "leet" or symbol substitution: Hackers are aware of these techniques.