USE OF WEAK PASSWORD-BASED SYSTEMS


Please sign in to view the rest of this entry.

USE OF WEAK PASSWORD-BASED SYSTEMS
1011404USE OF WEAK PASSWORD-BASED SYSTEMS
<anchor role="natural" id="p2001b4bf9980280"></anchor><emphasis role="bold">OVERVIEW OF THE SIN</emphasis> People hate passwords, particularly if they’re asked to choose good passwords, and often do not use a different one for each of their myriad of e-mail, online banking, instant messaging, and corporate and database accounts. Security experts hate passwords because people will use their kids’ names as passwords, or else write them down and stick them under the keyboard if they’re f…
Citation
Michael Howard; David LeBlanc; John Viega: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. USE OF WEAK PASSWORD-BASED SYSTEMS, Chapter (McGraw-Hill Professional, 2010), AccessEngineering Export