Abstract
Many web sites, operating systems, and other types of software have been built to use passwords to authenticate users. Although the security community has been working over the years to move toward systems that use more sophisticated authentication mechanisms, it is likely that password systems will be in use for some time. Hence, it is important to understand the strengths and weaknesses of passwords systems, and how to make them less vulnerable to attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Neil Daswani, Christoph Kern, and Anita Kesavan
About this chapter
Cite this chapter
(2007). Password Security. In: Foundations of Security. Apress. https://doi.org/10.1007/978-1-4302-0377-3_9
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0377-3_9
Publisher Name: Apress
Print ISBN: 978-1-59059-784-2
Online ISBN: 978-1-4302-0377-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books