亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ch18.htm

?? this explains the working of intranets.
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
<HTML><HEAD><TITLE>Chapter  18 -- How Passwords and Authentication Systems Work</TITLE><META></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF" LINK="#0000EE" VLINK="#551A8B" ALINK="#CE2910"><H1><FONT SIZE=6 COLOR=#FF0000>Chapter&nbsp;18</FONT></H1><H1><FONT SIZE=6 COLOR=#FF0000>How Passwords and AuthenticationSystems Work</FONT></H1><HR><P><CENTER><B><FONT SIZE=5><A NAME="CONTENTS">CONTENTS</A></FONT></B></CENTER><UL><LI><A HREF="#HowPasswordsWork">How Passwords Work</A><UL><LI><A HREF="#PasswordAuthenticationProtocol">Password Authentication Protocol</A><LI><A HREF="#ChallengeHandshakeAuthenticationProtocol">Challenge Handshake Authentication Protocol</A></UL><LI><A HREF="#HowAdditionalAuthenticationSystemsWork">How Additional Authentication Systems Work</A></UL><HR><P>What's the most effective way to gain unauthorized access to anintranet? If you guessed high-tech wizardry, programming beyondthe mere ken of mortals, or some kind of mastery of and insightinto the innermost workings of TCP/IP, you would be wrong. Mostattacks occur because an unauthorized person has managed to discoveran authorized person's user name and password. One cumbersomeway to address this problem is to require that users log in througha firewall with one password, and then require additional, differentpasswords to access various resources. However, making it hardfor users to use passwords is counterproductive and leads to increasedvulnerability. The passwords of systems administrators or superusersrequire special care, since if these passwords were compromised,the intruder would have full access to an intranet and all itscorporate riches.<P>New servers often come with standard default passwords. However,it is really the fault of the systems administrators who failto change the defaults. Similarly, care must be taken when, dueto necessary technical work being done, technicians require rootaccess or load custom utilities. Sometimes the default passwordsare changed, and you think you are safe, but at some point duringa disaster recovery process old users and/or passwords are loadedback in place.<P>Passwords can be discovered through brute force. Programs canbe written (or bought) that generate thousands of passwords. Thisis often referred to as a &quot;dictionary&quot; password checkerprogram. Administrators can purchase such programs to help findweak passwords, and can customize them to include additional terms.Brute force is more effective when passwords are short, so systemsadministrators may require certain minimum lengths for passwordsand password phrases.<P>Unauthorized access is an internal as well as external threat.No one would intentionally allow all internal users access totheir company's financial system, such as a check-writing program,even though as employees they would be authorized users for otherparts of the intranet. Secure passwords are probably more criticalfor protection from internal threats than external threats. Insidersalready have access to the names of fellow employees, their departments,and would know the conventions of the user name format. <P>In an effort to use passwords they can remember, people createpasswords that can be fairly easily guessed. Many people, forexample, use passwords made up of some combination of their firstand last names or their initials. Other popular passwords includethe names of children, birth dates or anniversary dates, licensenumbers of cars, and other familiar things. Again, internal threatsare the greater risk because of insider familiarity with colleagues'habits and physical access to cubicles (where the poster of thecobra is so prominently displayed).<P>Social engineering is another technique that can easily breakthe security of passwords. A remote access caller who contactsthe help desk late at night with a tale of woe about &quot;a bigreport due the next morning and I can't get in under my usualpassword, and so please just change it to something to get mein for this emergency&quot; is using social engineering to crackthe security of the password system. People don't want to mistrusttheir colleagues and are reluctant to sound paranoid or foolishby refusing access to co-workers. Workers also often need to provideothers with access to something that would normally be off-limits,while workers are on vacation, for example. In such cases intrudersdon't have to guess passwords, they are told the passwords. Thereal problems from this can come later, when authorized usersfail to change their password upon returning from vacation orwhen, unknown to them, a third party has been told the passwordfor some purpose while they were gone.<P>Most systems require that passwords be changed periodically sothat even if passwords are discovered or given out, there is onlya limited window of vulnerability. People, of course, might (andoften do) try to circumvent this by changing their password andthen changing it right back again. However, this can be preventedby systems requiring that when users change their passwords theymust choose a password that they have not used before. <P>The logical extension of this &quot;never before used&quot; passwordrequirement is the single-use password. There are several methodsof generating these passwords, including software and hardwaremethods. The software method still requires a truly secret passwordbut it is used to generate a number of one-time variations thatare used without encryption. The software method is still fundamentallya &quot;something you know&quot; type of protection. Hardwaresolutions add a &quot;something you have&quot; component, a physicaldevice that generates single use passwords. Smart cards are ahardware solution. They are credit card-sized devices that workwith special readers to respond to authorization requests. <P>Authentication systems work with password systems to make surethe users are who they say they are. Depending on the kind ofpassword system used in authentication systems, the password filescontaining the master list of all passwords on an intranet canbe plain text or encrypted.<P>In one system called the Password Authentication Protocol (PAP),the password file is encrypted. When someone logs onto the intranet,a server asks them for their user name and password. The user'sresponse is not encrypted at the workstation and so goes overthe wire in clear text. When the server receives the passwordfrom the user, it encrypts it using the same encryption schemethat was used to encrypt the password in the password file. Theserver then compares the two encrypted passwords. If they match,it knows to let the person in.<P>While the password file itself is particularly secure since it'sencrypted, the PAP system is vulnerable in another way. Sincethe password isn't encrypted until the server encrypts it, thismethod is vulnerable to packet sniffing attacks. Packet sniffingis a form of eavesdropping on the traffic over the wire. Sincethe passwords travel in clear text, someone capturing trafficcould steal all passwords transmitted across the intranet. Evenencrypted passwords traveling the wire are vulnerable to eavesdroppingwhen they are captured and replayed, convincing the server thatthey are authorized users. This is another reason why single-usepasswords provide more security.<P>The Challenge Handshake Authentication Protocol (CHAP), <I>a challenge-response</I>system, does not completely eliminate sending clear text over

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色屁屁一区二区| 久久日韩精品一区二区五区| 日本一区二区免费在线 | 欧美日韩国产另类一区| 亚洲三级免费观看| 91热门视频在线观看| 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆| 国产一区二区0| 国产免费久久精品| 99久久综合99久久综合网站| 一区二区三区在线不卡| 欧美精选一区二区| 国产在线不卡一区| 亚洲天堂av老司机| 欧美二区在线观看| 国产一区二区看久久| 中文字幕一区二区三区精华液| 99久久99久久综合| 日韩精品欧美精品| 精品少妇一区二区三区在线播放| 国产精品1区2区3区| 亚洲综合色婷婷| 精品国产一区二区三区久久影院| 国产盗摄女厕一区二区三区 | 国产亚洲精品福利| 91官网在线观看| 国产高清视频一区| 亚洲mv在线观看| 国产女人18毛片水真多成人如厕| 欧美日韩中文字幕一区二区| 国产成人精品综合在线观看| 三级精品在线观看| 亚洲日本护士毛茸茸| 欧美大片一区二区| 欧美欧美欧美欧美首页| 91丝袜国产在线播放| 午夜精品成人在线视频| 国产精品久久看| 久久久国产精品不卡| 日韩欧美电影一二三| 欧美日韩精品一区二区三区蜜桃| 成人动漫一区二区三区| 国产美女精品在线| 狠狠v欧美v日韩v亚洲ⅴ| 午夜精品一区二区三区三上悠亚 | 久久亚洲一级片| 欧美一区二区三区四区视频| 欧美亚洲国产一区二区三区| 91色九色蝌蚪| 色哦色哦哦色天天综合| 色综合欧美在线视频区| 欧美性色黄大片| 欧美性视频一区二区三区| 欧洲精品一区二区三区在线观看| 色婷婷精品大在线视频| 91蜜桃在线免费视频| 色激情天天射综合网| 欧洲在线/亚洲| 欧美精品v国产精品v日韩精品| 在线日韩一区二区| 91麻豆精品国产91久久久久久| 欧美成人精精品一区二区频| 久久综合九色综合欧美亚洲| 国产精品三级av在线播放| 亚洲电影欧美电影有声小说| 亚洲影视在线观看| 激情综合网天天干| 91网站在线观看视频| 欧美成人vr18sexvr| 中文字幕精品一区| 亚洲成人在线免费| 国产精品自拍一区| 欧洲av在线精品| 国产喂奶挤奶一区二区三区| 亚洲国产美国国产综合一区二区| 国内精品嫩模私拍在线| 欧美午夜电影网| 国产精品乱码妇女bbbb| 麻豆中文一区二区| 色一情一乱一乱一91av| 欧美成人bangbros| 日韩成人免费电影| 日本福利一区二区| 亚洲日本一区二区三区| 国产精品一区二区三区四区| 日韩欧美中文字幕制服| 亚洲一区在线播放| 99久久久国产精品免费蜜臀| 日本一区二区三区免费乱视频| 美女一区二区久久| 91精品国产综合久久精品图片| 一级特黄大欧美久久久| 成人av资源在线| 国产精品水嫩水嫩| 成人免费视频caoporn| 久久在线免费观看| 国产成人av一区二区三区在线| 久久精品一区二区| 国产精品主播直播| 国产亚洲精品aa午夜观看| 色婷婷综合久久久久中文一区二区| 国产日本亚洲高清| 成人激情av网| 一区二区三区在线观看国产| 欧美性感一区二区三区| 日本欧美在线看| 精品国产免费久久 | 国产精品69毛片高清亚洲| 2021国产精品久久精品| 成熟亚洲日本毛茸茸凸凹| 亚洲精品免费电影| 欧美精品 国产精品| 国产麻豆视频精品| 亚洲日本在线观看| 精品欧美一区二区三区精品久久| 国产自产v一区二区三区c| 国产精品久久久久久久久动漫| 在线看一区二区| 国产精品原创巨作av| 亚洲免费av高清| 欧美成人伊人久久综合网| 成人av第一页| 蜜臀av一区二区在线免费观看| 国产精品毛片久久久久久久| 91精品黄色片免费大全| 99久久精品国产一区二区三区| 肉肉av福利一精品导航| 亚洲激情第一区| 久久久噜噜噜久噜久久综合| 欧美在线观看一区| 成人午夜短视频| 国内精品嫩模私拍在线| 美腿丝袜亚洲色图| 三级欧美韩日大片在线看| 国产精品毛片a∨一区二区三区| 日韩欧美国产午夜精品| 欧美精品国产精品| www.亚洲精品| 成人国产视频在线观看| 国产乱色国产精品免费视频| 午夜视频一区二区| 一区二区三区欧美在线观看| 国产精品免费视频观看| 国产精品无圣光一区二区| 久久久99精品久久| 精品国产乱码久久久久久1区2区| 欧美一级黄色片| 精品理论电影在线| 精品嫩草影院久久| 久久精品网站免费观看| 国产精品嫩草影院av蜜臀| 自拍偷拍国产精品| 亚洲主播在线播放| 日本欧美在线看| 久久97超碰国产精品超碰| 中文字幕国产一区| 国产精品久久久久国产精品日日| 日本一区二区三区电影| 国产精品美女久久久久久久久| 在线成人免费视频| 国产亚洲欧美一级| 中文字幕av不卡| 久久久久国产精品麻豆| 国产亚洲精久久久久久| 国产精品嫩草影院av蜜臀| 视频一区二区欧美| 国产自产高清不卡| 99久免费精品视频在线观看| 日本韩国一区二区三区视频| 精品久久久久久亚洲综合网| 欧美成人激情免费网| 国产精品国产三级国产普通话蜜臀 | 视频一区二区欧美| 国产精品一区2区| 欧美在线视频日韩| 国产亚洲一区字幕| 日韩精品一级二级| 国产白丝网站精品污在线入口| 欧美主播一区二区三区| 欧美国产精品专区| 水蜜桃久久夜色精品一区的特点| 国产又黄又大久久| 日韩视频免费观看高清在线视频| 中文字幕一区二区不卡 | 一区二区三区免费在线观看| 免费的国产精品| 色欧美乱欧美15图片| 久久久久久久久免费| 狠狠色狠狠色综合系列| 欧美在线免费视屏| 成人免费一区二区三区视频| 国产精品亚洲一区二区三区在线 | 日日噜噜夜夜狠狠视频欧美人| 成人国产一区二区三区精品| 欧美一区二区福利在线| 亚洲成国产人片在线观看| 99久久99久久久精品齐齐| 国产偷v国产偷v亚洲高清| 国产一区二区三区| 日韩一区二区精品在线观看|