The Password Management Guide by Mohammed Al-Marhoon
Author:Mohammed Al-Marhoon
Language: eng
Format: epub
Tags: Reference
Published: 2013-03-20T16:00:00+00:00
9. Password Management Techniques
You may think that creating strong, secure and unique passwords for each of your online accounts is impossible because it will be difficult to remember all of them. Fortunately, there are many different kinds of techniques – including tools and services – available to make your passwords both secure and accessible from multiple computers and devices.
9.1. Algorithms
9.1.1. Tiered Password System
In simple English, tiered password systems are about having different levels of passwords for different types of websites, where the complexity of the password depends on what the consequences would be if that password is compromised/obtained. You may have two or three levels of website or security or passwords. An obvious common example of the tiered password system is the Three-Tiered Password System or Approach, which mainly categorizes the types of website or security into three levels:
• Low security: for signing up for a forum, newsletter, or downloading a trial version for a certain program.
• Medium security: for social networking sites, webmail and instant messaging services.
• High security: for anything where your personal finance is involved such as banking and credit card accounts. If these are compromised it could drastically and adversely affect your life.
Keep in mind that this categorization should be based on how critical each type of website is to you. What goes in which category will vary from person to person.
The point is that you don’t have to memorize hundreds of passwords to ensure your accounts will not be compromised. Use really strong passwords only for your high and medium security accounts.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6804)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6516)
Machine Learning Security Principles by John Paul Mueller(6478)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(6148)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(6105)
Solidity Programming Essentials by Ritesh Modi(4151)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3787)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3536)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Future Crimes by Marc Goodman(3367)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3324)
Learn Computer Forensics - Second Edition by William Oettinger(3282)
Incident Response with Threat Intelligence by Roberto Martínez(2998)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2961)
Mobile App Reverse Engineering by Abhinav Mishra(2899)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2888)
The Code Book by Simon Singh(2853)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2798)
