B FOR 204 Lecture Notes - Lecture 5: Packet Analyzer, Dictionary Attack, Intrusion Detection System

35 views4 pages
Making Our Systems Less Vulnerable
BFOR 204
Network and System Security
Security
Maintaining an appropriate level of computer security requires attention to
confidentiality, integrity and availability.
Intruders
Significant issue for networked systems is hostile or unwanted access.
o Unauthorized users
Either via network or local
Varying levels of competence
o key goal often is to acquire passwords
Protecting systems from intruders
Password Management
front-line defense against intruders
users supply both:
o login – determines privileges of that user
o password – to identify them
passwords often stored encrypted
o Unix uses multiple DES (variant with salt)
o more recent systems use hash function
Password Cracking
Two steps
1) Obtain the hash of the password
o Hash – It is a value that is calculated by processing the text of a
password through an algorithm.
o Salt - It is random data that is used as an additional input to an
algorithm that "hashes" a password.
2) Crack the password!
o Using a cracking program.
o Can’t reverse the hash back to the password.
o But can create a password using the hash.
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents