Find Sporting Goods on eBay
Video and Audio], Broadcasting and podcasting Broadcast On the Net

[description], Story, any other text you want to use.

Open Sesame - Password Security

 by: Terrence F. Doheny

"Open Sesame!" is probably the most famous password in literature. It gave Ali Baba access to vast treasure. In the realm of technology, computer passwords also give access to valuable treasures: precious business and personal data.

Information about your personal life, buying habits, credit quality and life style is valuable to those who can profit from it. For the Corporation, information has even greater worth. It is not the "Bricks and Mortar" but the intangibles such as intellectual property, client lists, market strategies, pricing and compensation that account for over half the value of the modern enterprise.

All of this personal and business data most likely resides on a database somewhere and is available with a password. In fact, passwords are the most common means of entry in any system. They are also acknowledged as the most vulnerable points for security. "Weak" or compromised passwords are the easiest way for hackers to gain entry into a system.

Simple or short passwords can be easily discovered through "brute force" or "dictionary" attacks which concentrate intense computer power to crack a password. A two letter password, for example, has only 676 combinations. A password with eight letters offers more safety with 208,000,000 combinations.

Ideally, a password should consist of 8 or more characters. They should also contain a mixture of upper and lower case letters, symbols and numbers. "A$d3B5i9X" would be an example. Microsoft security has encouraged the concept of the "Pass Phrase" as an alternative. A phrase such as,"TheLastGoodBookUBoughtCost$25!" has all of the needed elements and is also easy to remember.

The human factor or social engineering contributes to password compromises. It is estimated that employees share their password eight times a year. Passwords can also be cajoled from untrained or naïve workers. The standard rule is NEVER share a password.

Remember the cliché of the "Six Degrees of Separation." You cannot know who will eventually end up with your password and own it.

To cope with these issues, many leading edge firms are adopting a defense in depth strategy utilizing three elements to better safeguard their information

The three layers of authentication consist of:

What you know…


A strong password or pass phrase

What you have…


A Crypto-key, smart card or token

Who you are…


A biometric aspect such as fingerprint, hand, or retinal recognition

Usage of these three defensive measures will increase dramatically in the future as people seek to thwart ever increasing threats to their private and personal information. Many companies will be mandating them as a significant part of their security best-practices to safeguard an extremely valuable asset: their treasured data.

About The Author

Terrence F. Doheny President of Beyond If Solutions, LLC.


www.beyondifsolutions.com


terry@beyondifsolutions.com

© 2004, Terrence F. Doheny


net radio

Brodcast On the Net - streaming video, streaming audio, video conferencing, audio
Broadcast On the Net. If you are running a search for video conferencing and are looking for audio streaming or video streaminng and web conferenceing then you have come to the proper place. You can find many of the finest sites with the best conferencing services. Even find video studios or maybe the video talent to produce your program, no matter what you are looking for you can see the best streaming media here.
Brodcast On the Net - streaming video, streaming audio, video conferencing, audio

If you want specific information, such as information about net radio Web directories are the way to go, because they search all the contents of a website. Indexes use software programs called spiders and robots that scour the Internet, analyzing millions of web pages and newsgroup postings and indexing all of the words, including net radio.

Indexes like AltaVista and Google find individual pages of a net radio website that match your search criteria, even if the site itself has nothing to do with what you are looking for. You can often find unexpected gems of information this way, but be prepared to wade through a lot of irrelevant information too. Our net radio information is apposite.

Search results may be ranked in order of relevancy eg the number of times your net radio search term appears in a document or how closely the net radio document appears to match a concept you have entered. This is a much more thorough way to locate what you want. Alternatively you can go with our net radio recommendations and save a lot of time.

Main Menu
Broadcast On the Net
Site Map

Affiliate Ads, Links, news, etc.

News for 07-May-26

Source: BBC News - Home
Is Nigeria's 'plastic rice' actually real?

Source: BBC News - Home
George North: World Rugby wants more information from RFU over 'non-compliance'

Source: BBC News - Home
Carrie Fisher: Star Wars actress suffers heart attack

Source: BBC News - Home
British passenger missing from Queen Mary 2 liner

Source: BBC News - Home
500 years later

Source: BBC News - Home
Drip dry

Source: BBC News - Home
Real-life Libya plane hijack halts hijack film shoot

Source: BBC News - Home
Trump official Paladino under fire over crude Obama remarks

Source: BBC News - Home
Obama's snowman phobia

Source: BBC News - Home
The longest kiss


Links
Links
Links
Google

Medical Newscast | Take Medicine Correctly | Internet Meetings | Medical Newscast
Copyright © 2005. Name of Site here. Last Updated: Thursday, 07-May-2026 00:00:53 MDT.
Go Meetings   Present On The Net   Listen On The Net