Next we will add at least one number to it. You don’t want to pick the first letter, as that would be more common and easy to guess. So first we change it to have at least one uppercase letter. You will note that this word is all lowercase characters, which is not very secure. So for our example we will use the word “mountain”. So let’s pick a 8 character word that is easy to remember and make it strong. Here are some ideas on how to create strong passwords. The trick is to create a password that is memorable and yet long enough and uses a wide array of characters. For example, lets say you use you the word “mountain” as your password, since the word is in the dictionary, a hacker using the dictionary as a set of passwords will crack your data rather quickly. So given a 9 character password can be a strong password, many people will take any easy to remember 9 character word and use that as a password – this can be a big mistake! Hackers know this also, so they create and share dictionaries of common passwords and will even mine your personal data for keywords they can use to reduce the crack time to mere hours. So with a password as small as 9 characters we can make it very hard for a hacker to crack our database. *assumes each character can be any ASCII character. This means that only hackers with *GOOD* resources should be able to obtain this same level, the average hacker is going to probably take twice as long as these numbers. In 2010 a top password recovery service in the US says that their state-of-the-art computing systems can try about 20 million passwords a second. Now lets see what effect password length has on password strength. Time to create generate all permutations of 4 character password Now lets allow the password to be any lowercase, uppercase letters, numbers and symbols (i.e., Now it takes 25 seconds generate all permutations of a 4 character password, a big improvement! For example, it takes less than a second for a fast computer to run all the permutations of 4 digit PIN containing only digits (i.e., 2578). Using strong encryption and a strong password will provide a very high level of security for your data.Ī strong password is not just a long string, but is also determined by the number of different characters that are used in forming each character of the password. The best protection against this type of attack is a strong password because, as you will see, it will take too long for the hacker to figure out your password. A brute force attack is where a hacker uses software to try a series of common passwords or all possible passwords in an attempt to guess your password and gain access to your data. In contrast, mSecure encrypts all of the data stored in its database using strong 256bit Blowfish encryption, which has not been knowingly cracked, so there is no back door to your data.Įven though your data is strongly encrypted, it may still vulnerable to a brute force attack if the hacker has access to your database. A hacker will usually attack the backdoor of the web site which is its database to gain access to your personal information. Usually the web site only encrypts the username or password leaving the data you submitted the to the web site with little protection. Many web services, such as an online notes services, use a username or password combination to allow or deny you access to certain parts of the website.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |