Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:it-security:passwords [2023/10/18 21:51] – angelegt psycore | en:it-security:passwords [2024/02/05 08:33] (current) – old revision restored (2024/02/04 23:29) psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{tag> | ||
====== Secure passwords ====== | ====== Secure passwords ====== | ||
- | | Version | 3.0 | | + | | Version | 3.1 | |
===== 1.0 Introduction ===== | ===== 1.0 Introduction ===== | ||
- | In today' | + | Passwords |
===== 2.0 Dealing with passwords ===== | ===== 2.0 Dealing with passwords ===== | ||
Let's start by clarifying two things: | Let's start by clarifying two things: | ||
- | The wrong and the right way to handle passwords, as well as the unrealisable ideal state. | + | The wrong and the right way to handle passwords, as well as the unrealisable ideal situation. |
- | ==== 2.1 Ideal state ==== | + | ==== 2.1 Ideal situation |
- | The ideal way of dealing with passwords would be as follows: | + | The ideal handling |
- | Integrated | + | Integrated |
- | ==== 2.2 Wrong management | + | ==== 2.2 Incorrect administration |
- | Let's look at a few things that are fundamentally wrong with password management: | + | Let's look at a few things that are fundamentally wrong when it comes to password management: |
- Passwords should never be written down | - Passwords should never be written down | ||
- | - Keeping | + | - Storing |
- | - Sticking them under the keyboard is not ideal either. | + | - Sticking them under the keyboard is not ideal either |
- | ==== 2.3 Proper management | + | ==== 2.3 Correct administration |
- | Passwords should be managed | + | Passwords should be managed |
- Password matrices | - Password matrices | ||
- Special hardware | - Special hardware | ||
- | - Card-based password management systems | + | - Card-supported |
- | - Password | + | - Password |
- | I will discuss | + | I will go into the password |
- | ==== 2.4 Password | + | ==== 2.4 Password |
- | Password programmes are usually databases that clearly | + | Password programmes are usually databases that store data in a clearly organised manner. |
What must such a programme be able to do? | What must such a programme be able to do? | ||
- A password generator should be integrated | - A password generator should be integrated | ||
Line 49: | Line 50: | ||
- Adjustable length | - Adjustable length | ||
- Combination of numbers, upper and lower case letters and special characters | - Combination of numbers, upper and lower case letters and special characters | ||
- | - The database must not be stored in plain text. | + | - The database must not be stored in plain text |
- | Such a programme | + | Such a tool is [[https:// |
===== 3.0 Structure of the password ===== | ===== 3.0 Structure of the password ===== | ||
- | A secure password must fulfil certain requirements. We will now go into these in more detail. | + | A secure password must fulfil certain requirements. We will now look at these in more detail. |
+ | < | ||
+ | flowchart TD | ||
+ | A[Secure password] | ||
+ | B[Letters] | ||
+ | C[Numbers] | ||
+ | D[Special characters] | ||
+ | E[Length] | ||
+ | B1[A-Z] | ||
+ | B2[a-z] | ||
+ | C1[0-9] | ||
+ | D1[+-!?_-] | ||
+ | E1[12] | ||
+ | A-->B | ||
+ | A-->C | ||
+ | A-->D | ||
+ | A-->E | ||
+ | B-->B1 | ||
+ | B-->B2 | ||
+ | C-->C1 | ||
+ | D-->D1 | ||
+ | E--minimum--> | ||
+ | </ | ||
==== 3.1 Passwords should not look like this ==== | ==== 3.1 Passwords should not look like this ==== | ||
Not like this: | Not like this: | ||
- | * " | + | * " |
* Pure numbers | * Pure numbers | ||
* Pure letters | * Pure letters | ||
- | * Simple words like sex, god etc. | + | * Simple words such as sex, god etc. |
- | * No personal data such as sister' | + | * No personal data such as sister' |
Line 73: | Line 95: | ||
A good password should have at least 12 characters. In addition, it should be a combination of numbers, upper and lower case letters and special characters. | A good password should have at least 12 characters. In addition, it should be a combination of numbers, upper and lower case letters and special characters. | ||
- | Examples of good and secure passwords are: | + | Examples of good and secure passwords are |
ZfA5ZWc~$w8A | ZfA5ZWc~$w8A | ||
j? | j? | ||
@ZT§$& | @ZT§$& | ||
? | ? | ||
- | Since we would certainly have problems | + | As we would certainly have problems |
===== 4.0 Passwords without programmes ===== | ===== 4.0 Passwords without programmes ===== | ||
- | If you don't want to create a password with a programme, there is a fairly | + | If you don't want to create a password with a programme, there is a very simple method |
<code text> | <code text> | ||
- | Dies ist ein Satz, der mit der Zahl 0 und 9 | + | Ich bilde einen Satz mit Groß- & Kleinbuchstaben und den Zahlen |
</ | </ | ||
- | We take the first letters of the sentence and the numbers and form the password: | + | We take the first letters of the sentence, the special character |
<code text> | <code text> | ||
- | DieSdmdZ0u9 | + | IbeSmG& |
</ | </ | ||
- | In this way, you can quickly | + | This is a quick and easy way to create a password that you will remember. |
===== 5.0 On the Internet ===== | ===== 5.0 On the Internet ===== | ||
- | In order to ensure a certain basic security of one' | + | To ensure a certain basic security of your data on the Internet, it is important to keep a few things |
- | * Passwords should always be sent over a [[https:// | + | * Passwords should always be sent via a [[wp>Transport_Layer_Security]] connection |
* Use a different password for each site | * Use a different password for each site | ||
- | * The basic [[windows: | + | * Follow the basic [[en:windows: |
* Never share passwords | * Never share passwords | ||
===== 6.0 Multifactor authentication ===== | ===== 6.0 Multifactor authentication ===== | ||
- | Wherever possible [[https:// | + | Wherever possible [[wp>MFA]] should be used wherever possible |
===== 7.0 Conclusion ===== | ===== 7.0 Conclusion ===== | ||
- | The times are over when we could carelessly handle access data. Phishing strategies and hacker attacks are on the increase | + | The days when we could carelessly handle access data are over. Phishing strategies and hacker attacks are on the rise and you have to adapt to the trend in order to counteract them. Of course, there is never a 100% guarantee of security, but you can at least take good precautions to avoid becoming a victim of data theft. |
- | A practical tool for generating passwords | + | There is a practical tool for generating passwords [[en:software: |