Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:it-security:passwords [2023/11/07 16:19] – Automatic translation 82.80.249.212 | en:it-security:passwords [2024/02/05 08:33] (current) – old revision restored (2024/02/04 23:29) psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{tag> | ||
====== Secure passwords ====== | ====== Secure passwords ====== | ||
- | | Version | 3.0 | | + | | Version | 3.1 | |
===== 1.0 Introduction ===== | ===== 1.0 Introduction ===== | ||
- | Passwords are becoming increasingly important these days. Online banking, FTP access and website accounts | + | Passwords are becoming increasingly important these days. Online banking, FTP access and website accounts |
===== 2.0 Dealing with passwords ===== | ===== 2.0 Dealing with passwords ===== | ||
Line 17: | Line 18: | ||
The ideal handling of passwords would look like this: | The ideal handling of passwords would look like this: | ||
- | Integrated into our brain would be a [[wpde>MySQL]] database that could store an infinite amount of information and retrieve it at any time. We would then be able to remember every password. Of course, this is completely utopian. At least with the current state of technology. But what we can't do, a computer can do for us. But more on that later. | + | Integrated into our brain would be a [[wp>MySQL]] database that could store an infinite amount of information and retrieve it at any time. We would then be able to remember every password. Of course, this is completely utopian. At least with the current state of technology. But what we can't do, a computer can do for us. But more on that later. |
Line 43: | Line 44: | ||
==== 2.4 Password programmes ==== | ==== 2.4 Password programmes ==== | ||
- | Password programmes are usually databases that store data in a clearly organised | + | Password programmes are usually databases that store data in a clearly organised |
What must such a programme be able to do? | What must such a programme be able to do? | ||
- A password generator should be integrated | - A password generator should be integrated | ||
Line 51: | Line 52: | ||
- The database must not be stored in plain text | - The database must not be stored in plain text | ||
- | Such a programme | + | Such a tool is [[https:// |
Line 58: | Line 59: | ||
A secure password must fulfil certain requirements. We will now look at these in more detail. | A secure password must fulfil certain requirements. We will now look at these in more detail. | ||
+ | < | ||
+ | flowchart TD | ||
+ | A[Secure password] | ||
+ | B[Letters] | ||
+ | C[Numbers] | ||
+ | D[Special characters] | ||
+ | E[Length] | ||
+ | B1[A-Z] | ||
+ | B2[a-z] | ||
+ | C1[0-9] | ||
+ | D1[+-!? | ||
+ | E1[12] | ||
+ | A-->B | ||
+ | A-->C | ||
+ | A-->D | ||
+ | A-->E | ||
+ | B-->B1 | ||
+ | B-->B2 | ||
+ | C-->C1 | ||
+ | D-->D1 | ||
+ | E--minimum--> | ||
+ | </ | ||
==== 3.1 Passwords should not look like this ==== | ==== 3.1 Passwords should not look like this ==== | ||
Line 85: | Line 107: | ||
<code text> | <code text> | ||
- | Dies ist ein Satz, der mit der Zahl 0 und 9 | + | Ich bilde einen Satz mit Groß- & Kleinbuchstaben und den Zahlen |
</ | </ | ||
- | We take the first letters of the sentence and the numbers and form the password: | + | We take the first letters of the sentence, the special character |
<code text> | <code text> | ||
- | DieSdmdZ0u9 | + | IbeSmG& |
</ | </ | ||
Line 100: | Line 122: | ||
To ensure a certain basic security of your data on the Internet, it is important to keep a few things in mind: | To ensure a certain basic security of your data on the Internet, it is important to keep a few things in mind: | ||
- | * Passwords should always be sent via a [[https:// | + | * Passwords should always be sent via a [[wp>Transport_Layer_Security]] connection |
* Use a different password for each site | * Use a different password for each site | ||
- | * Follow the basic [[windows: | + | * Follow the basic [[en:windows: |
* Never share passwords | * Never share passwords | ||
===== 6.0 Multifactor authentication ===== | ===== 6.0 Multifactor authentication ===== | ||
- | Wherever possible [[https:// | + | Wherever possible [[wp>MFA]] should be used wherever possible (e.g. via an authenticator app or a hardware token). |
===== 7.0 Conclusion ===== | ===== 7.0 Conclusion ===== | ||
Line 113: | Line 135: | ||
The days when we could carelessly handle access data are over. Phishing strategies and hacker attacks are on the rise and you have to adapt to the trend in order to counteract them. Of course, there is never a 100% guarantee of security, but you can at least take good precautions to avoid becoming a victim of data theft. | The days when we could carelessly handle access data are over. Phishing strategies and hacker attacks are on the rise and you have to adapt to the trend in order to counteract them. Of course, there is never a 100% guarantee of security, but you can at least take good precautions to avoid becoming a victim of data theft. | ||
- | There is a practical tool for generating passwords [[software: | + | There is a practical tool for generating passwords [[en:software: |