Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
en:it-security:passwords [2023/11/16 20:01] – Automatic translation 135.181.138.9en:it-security:passwords [2024/02/05 08:33] (current) – old revision restored (2024/02/04 23:29) psycore
Line 1: Line 1:
 +{{tag>english startpage it-security blog}}
 ====== Secure passwords ====== ====== Secure passwords ======
  
-| Version | 3.|+| Version | 3.|
  
 ===== 1.0 Introduction ===== ===== 1.0 Introduction =====
  
-Passwords are becoming increasingly important these days. Online banking, FTP access and website accounts force us to have more and more passwords. Of course you can manage everything with a password, but I doubt whether this is in the interest of security. In this tutorial, I will explain what a password should look like and what you should bear in mind when managing it.+Passwords are becoming increasingly important these days. Online banking, FTP access and website accounts are forcing us to have more and more passwords. Of course you can manage everything with a password, but I doubt whether this is in the interest of security. In this tutorial, I will explain what a password should look like and what you should bear in mind when managing it.
  
 ===== 2.0 Dealing with passwords ===== ===== 2.0 Dealing with passwords =====
Line 17: Line 18:
  
 The ideal handling of passwords would look like this: The ideal handling of passwords would look like this:
-Integrated into our brain would be a [[wpde>MySQL]] database that could store an infinite amount of information and retrieve it at any time. We would then be able to remember every password. Of course, this is completely utopian. At least with the current state of technology. But what we can't do, a computer can do for us. But more on that later.+Integrated into our brain would be a [[wp>MySQL]] database that could store an infinite amount of information and retrieve it at any time. We would then be able to remember every password. Of course, this is completely utopian. At least with the current state of technology. But what we can't do, a computer can do for us. But more on that later.
  
  
Line 43: Line 44:
 ==== 2.4 Password programmes ==== ==== 2.4 Password programmes ====
  
-Password programmes are usually databases that store data in a clearly organised way.+Password programmes are usually databases that store data in a clearly organised manner.
 What must such a programme be able to do? What must such a programme be able to do?
   - A password generator should be integrated   - A password generator should be integrated
Line 51: Line 52:
   - The database must not be stored in plain text   - The database must not be stored in plain text
  
-Such a programme is [[https://keepass.info/index.html|hier]] available.+Such a tool is [[https://keepass.info/index.html|available]] here.
  
  
Line 58: Line 59:
 A secure password must fulfil certain requirements. We will now look at these in more detail. A secure password must fulfil certain requirements. We will now look at these in more detail.
  
 +<mermaid> 
 +  flowchart TD 
 +      A[Secure password] 
 +      B[Letters] 
 +      C[Numbers] 
 +      D[Special characters] 
 +      E[Length] 
 +      B1[A-Z] 
 +      B2[a-z] 
 +      C1[0-9] 
 +      D1[+-!?_-] 
 +      E1[12] 
 +      A-->B 
 +      A-->C 
 +      A-->D 
 +      A-->E 
 +      B-->B1 
 +      B-->B2 
 +      C-->C1 
 +      D-->D1 
 +      E--minimum-->E1 
 +</mermaid>
  
 ==== 3.1 Passwords should not look like this ==== ==== 3.1 Passwords should not look like this ====
Line 100: Line 122:
 To ensure a certain basic security of your data on the Internet, it is important to keep a few things in mind: To ensure a certain basic security of your data on the Internet, it is important to keep a few things in mind:
  
-  * Passwords should always be sent via a [[https://de.wikipedia.org/wiki/Transport_Layer_Security|SSL]] connection+  * Passwords should always be sent via a [[wp>Transport_Layer_Security]] connection
   * Use a different password for each site   * Use a different password for each site
-  * Follow the basic [[windows:security:basics|Windows security tips]] +  * Follow the basic [[en:windows:security:basics|Windows security tips]] 
   * Never share passwords   * Never share passwords
  
 ===== 6.0 Multifactor authentication ===== ===== 6.0 Multifactor authentication =====
  
-Wherever possible [[https://de.wikipedia.org/wiki/Multi-Faktor-Authentisierung|MFAs (multifactor authentication)]] should be used wherever possible (e.g. via an authenticator app or a hardware token).+Wherever possible [[wp>MFA]] should be used wherever possible (e.g. via an authenticator app or a hardware token).
  
 ===== 7.0 Conclusion ===== ===== 7.0 Conclusion =====