Encryption - Click to edit Master subtitle style 8/15/11...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Click to edit Master subtitle style 8/15/11 Chapter 12 Authentication & Encryption (More Safeguards) 8/15/11 Todays Objectives  Know how to select a good password.  Know the importance of backups and how to make good backups.  Understand what encryption is and how it works. 8/15/11 What is Authentication? Process to verify that information comes from trusted source  Passwords  Pass Cards  Biometrics 8/15/11 Safeguard Question  Consider one of your non-VT passwords. How long do you think it would take a hacker to figure out that password? a. Seconds b. Minutes c. Hours 8/15/11 What Passwords Should I Avoid?  identical characters  alphabetic or numeric series  characters adjacent on keyboard  anything obvious about you 8/15/11 How Are Passwords Stolen?  Steal encrypted passwords  Guess password Brute Force Dictionary Cracks Hybrid Cracks  Encrypt guess  Compare encrypted guess to stolen encrypted 8/15/11 Cracking Metrics  1 GHz Pentium Processor  1,000 to encrypt guessed password and compare to target  1 million crack-n-compares per second 8/15/11 Brute Force Cracks Max Avg 4 lower (26^4) .457 sec .25 sec 6 lower (26^6) 5.15 min5....
View Full Document

This note was uploaded on 08/15/2011 for the course ACIS 1504 at Virginia Tech.

Page1 / 30

Encryption - Click to edit Master subtitle style 8/15/11...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online