What is a Strong Password? Password Strength

Gauloran

Moderasyon Ekibi Lideri
7 Tem 2013
8,198
669
Password

A password, sometimes called a passcode, is a memorized secret, typically a string of characters, usually used to confirm the identity of a user. Using the terminology of the NIST Digital Identity Guidelines, the secret is memorized by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity. In general, a password is an arbitrary string of characters including letters, digits, or other symbols. If the permissible characters are constrained to be numeric, the corresponding secret is sometimes called a personal identification number (PIN). Despite its name, a password does not need to be an actual word; indeed, a non-word (in the dictionary sense) may be harder to guess, which is a desirable property of passwords. A memorized secret consisting of a sequence of words or other text separated by spaces is sometimes called a passphrase. A passphrase is similar to a password in usage, but the former is generally longer for added security.

Transaction authentication

A transaction authentication number (TAN number) is used by some online banking services as a form of single use one-time passwords (OTPs) to authorize financial transactions. TANs are a second layer of security above and beyond the traditional single-password authentication. TANs provide additional security because they act as a form of two-factor authentication (2FA). If the physical ******** or token containing the TANs is stolen, it will be useless without the password. Conversely, if the login data are obtained, no transactions can be performed without a valid TAN.

What Makes a Password Strong?
The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words. The good news is you don’t have to memorize awful strings of random letters numbers and symbols in order to incorporate all of these aspects into your passwords. You simply need a few tricks.

How to Easily Spot a Weak Password
The secret is to make passwords memorable but hard to guess. Learning a few simple skills will make creating strong memorable passwords easy. Creating them can actually be fun - and your payoff in increased safety is huge. To understand the definition of a strong password, it’s best to go over common practices that put millions of users at risk on a daily basis. Let’s look at a few examples of weak passwords to understand why these put you at risk:

It uses common words, like “Password”
The word "Password" is the most commonly used password. It’s also pathetically weak - as are ’default’ and ’blank’. These are simple words that can be easily guessed by a user. However, humans aren’t your only concern. Programs that use automated databases can perform a dictionary assault on your system, identifying the password easily.

It’s easy to identify, especially if someone knows you well
A common example is using a last name + year of birth combination. Marshall1968 - though this example uses 12 characters and includes letters and numbers, it includes both a name that can be associated with you or your family, and other identifying pieces of information such as your birth year, which means it can be easily hacked.

It’s short and can be easily deciphered
Let’s say you use “F1avoR” as a password, mixing up capital letters and numbers. Here are two important reasons why this password example isn’t safe:

It’s too short. A long password is a strong password. The harder a hacker or a code-breaking software application has to work, the better.
The number of substitutions can be easily guessed. Substituting the number 1 for the letter l is easy to guess for both humans and software.

How to Keep a Strong Password Secure

So you've settled on a password that's the perfect length, obscure, and mixes letters, numbers, and cases. You're on the right track, but not to total password security just yet. Don’t reuse your passwords. If you’re using the same password across email, shopping, and other websites holding sensitive personal data (or even a local community website) and one of those experiences a breach, you’ve now exposed the other services to the risk of being breached as well. Don’t write your passwords down. In can be tempting, especially in the workplace, to keep track of passwords f the old-fashioned way, but these are easily discovered. Use a password manager. There are many apps that store your passwords securely. Don’t share your passwords. This one is a no-brainer, and if you must share, change it as soon as possible.

Also you can use these websites:
Kod:
https://www.howsecureismypassword.net/
http://www.passwordmeter.com/
http://www.passwordmeter.com/
http://www.yetanotherpasswordmeter.com/
http://www.geekwisdom.com/dyn/passwdmeter
http://ss64.com/pass/
https://telepathwords.research.microsoft.com/

Tips for Creating a Unique Password (That’s Also Strong)
Short answer: The secret to creating a hard-to-crack password that’s unique and easy to remember is to focus on making it memorable and making it hard to guess. Seems simple enough, right? By learning a few simple skills, you can easily create a strong and memorable password with minimal effort. Plus, creating them can actually be fun - and your payoff in increased safety is huge.

To a**** these easy to guess or hack passwords try one or more of the following tricks:

Use a phrase and incorporate shortcut codes or acronyms
These examples let you use phrases that either means something to you, or you associate with a type of website. For example, the ’all for one and one for all’ may be the password for a social networking site where it’s all about sharing. It could be a phrase about money for a banking site, and so on.

2BorNot2B_ThatIsThe? (To be or not to be, that is the question - from Shakespeare)
L8r_L8rNot2day (Later, later, not today - from the kid's rhyme)
4Score&7yrsAgo (Four score and seven years ago - from the Gettysburg Address)
John3:16=4G (Scriptural reference)
14A&A41dumaS (one for all and all for 1 - from The Three Musketeers, by Dumas)
Use passwords with common elements, but customized to specific sites
These examples tell a story using a consistent style so if you know how you write the first sections, and you’re on the login page for a site you’ll know what to add.

ABT2_uz_AMZ! (About to use Amazon)
ABT2_uz_BoA! (About to use Bank of America)
Pwrd4Acct-$$ (Password for account at the bank)
Pwrd4Acct-Fb (Password for a Facebook account)

Don't use these passwords:

1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123
11. Nicole
12. Daniel
13. babygirl
14. monkey
15. Jessica
16. Lovely
17. michael
18. Ashley
19. 654321
20. Qwerty

Https?

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.

The principal motivations for HTTPS are authentication of the accessed website, and protection of the privacy and integrity of the exchanged data while in transit. It protects against man-in-the-middle attacks, and the bidirectional encryption of communications between a client and server protects the communications against eavesdropping and tampering. In practice, this provides a reasonable assurance that one is communicating with the intended website without interference from attackers.

The authentication aspect of HTTPS requires a trusted third party to sign server-side digital certificates. This was historically an expensive operation, which meant fully authenticated HTTPS connections were usually found only on secured payment transaction services and other secured corporate information systems on the World Wide Web. In 2016, a campaign by the Electronic Frontier Foundation with the support of web browser developers led to the protocol becoming more prevalent. HTTPS is now used more often by web users than the original non-secure HTTP, primarily to protect page authenticity on all types of websites; secure accounts; and to keep user communications, identity, and web browsing private.

Source: https://www.turkhackteam.org/kripto...sifrem-guvenlimi-genis-makale-maskhacker.html
Translator Gauloran

 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.