亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ch18.htm

?? this explains the working of intranets.
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
<HTML><HEAD><TITLE>Chapter  18 -- How Passwords and Authentication Systems Work</TITLE><META></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF" LINK="#0000EE" VLINK="#551A8B" ALINK="#CE2910"><H1><FONT SIZE=6 COLOR=#FF0000>Chapter&nbsp;18</FONT></H1><H1><FONT SIZE=6 COLOR=#FF0000>How Passwords and AuthenticationSystems Work</FONT></H1><HR><P><CENTER><B><FONT SIZE=5><A NAME="CONTENTS">CONTENTS</A></FONT></B></CENTER><UL><LI><A HREF="#HowPasswordsWork">How Passwords Work</A><UL><LI><A HREF="#PasswordAuthenticationProtocol">Password Authentication Protocol</A><LI><A HREF="#ChallengeHandshakeAuthenticationProtocol">Challenge Handshake Authentication Protocol</A></UL><LI><A HREF="#HowAdditionalAuthenticationSystemsWork">How Additional Authentication Systems Work</A></UL><HR><P>What's the most effective way to gain unauthorized access to anintranet? If you guessed high-tech wizardry, programming beyondthe mere ken of mortals, or some kind of mastery of and insightinto the innermost workings of TCP/IP, you would be wrong. Mostattacks occur because an unauthorized person has managed to discoveran authorized person's user name and password. One cumbersomeway to address this problem is to require that users log in througha firewall with one password, and then require additional, differentpasswords to access various resources. However, making it hardfor users to use passwords is counterproductive and leads to increasedvulnerability. The passwords of systems administrators or superusersrequire special care, since if these passwords were compromised,the intruder would have full access to an intranet and all itscorporate riches.<P>New servers often come with standard default passwords. However,it is really the fault of the systems administrators who failto change the defaults. Similarly, care must be taken when, dueto necessary technical work being done, technicians require rootaccess or load custom utilities. Sometimes the default passwordsare changed, and you think you are safe, but at some point duringa disaster recovery process old users and/or passwords are loadedback in place.<P>Passwords can be discovered through brute force. Programs canbe written (or bought) that generate thousands of passwords. Thisis often referred to as a &quot;dictionary&quot; password checkerprogram. Administrators can purchase such programs to help findweak passwords, and can customize them to include additional terms.Brute force is more effective when passwords are short, so systemsadministrators may require certain minimum lengths for passwordsand password phrases.<P>Unauthorized access is an internal as well as external threat.No one would intentionally allow all internal users access totheir company's financial system, such as a check-writing program,even though as employees they would be authorized users for otherparts of the intranet. Secure passwords are probably more criticalfor protection from internal threats than external threats. Insidersalready have access to the names of fellow employees, their departments,and would know the conventions of the user name format. <P>In an effort to use passwords they can remember, people createpasswords that can be fairly easily guessed. Many people, forexample, use passwords made up of some combination of their firstand last names or their initials. Other popular passwords includethe names of children, birth dates or anniversary dates, licensenumbers of cars, and other familiar things. Again, internal threatsare the greater risk because of insider familiarity with colleagues'habits and physical access to cubicles (where the poster of thecobra is so prominently displayed).<P>Social engineering is another technique that can easily breakthe security of passwords. A remote access caller who contactsthe help desk late at night with a tale of woe about &quot;a bigreport due the next morning and I can't get in under my usualpassword, and so please just change it to something to get mein for this emergency&quot; is using social engineering to crackthe security of the password system. People don't want to mistrusttheir colleagues and are reluctant to sound paranoid or foolishby refusing access to co-workers. Workers also often need to provideothers with access to something that would normally be off-limits,while workers are on vacation, for example. In such cases intrudersdon't have to guess passwords, they are told the passwords. Thereal problems from this can come later, when authorized usersfail to change their password upon returning from vacation orwhen, unknown to them, a third party has been told the passwordfor some purpose while they were gone.<P>Most systems require that passwords be changed periodically sothat even if passwords are discovered or given out, there is onlya limited window of vulnerability. People, of course, might (andoften do) try to circumvent this by changing their password andthen changing it right back again. However, this can be preventedby systems requiring that when users change their passwords theymust choose a password that they have not used before. <P>The logical extension of this &quot;never before used&quot; passwordrequirement is the single-use password. There are several methodsof generating these passwords, including software and hardwaremethods. The software method still requires a truly secret passwordbut it is used to generate a number of one-time variations thatare used without encryption. The software method is still fundamentallya &quot;something you know&quot; type of protection. Hardwaresolutions add a &quot;something you have&quot; component, a physicaldevice that generates single use passwords. Smart cards are ahardware solution. They are credit card-sized devices that workwith special readers to respond to authorization requests. <P>Authentication systems work with password systems to make surethe users are who they say they are. Depending on the kind ofpassword system used in authentication systems, the password filescontaining the master list of all passwords on an intranet canbe plain text or encrypted.<P>In one system called the Password Authentication Protocol (PAP),the password file is encrypted. When someone logs onto the intranet,a server asks them for their user name and password. The user'sresponse is not encrypted at the workstation and so goes overthe wire in clear text. When the server receives the passwordfrom the user, it encrypts it using the same encryption schemethat was used to encrypt the password in the password file. Theserver then compares the two encrypted passwords. If they match,it knows to let the person in.<P>While the password file itself is particularly secure since it'sencrypted, the PAP system is vulnerable in another way. Sincethe password isn't encrypted until the server encrypts it, thismethod is vulnerable to packet sniffing attacks. Packet sniffingis a form of eavesdropping on the traffic over the wire. Sincethe passwords travel in clear text, someone capturing trafficcould steal all passwords transmitted across the intranet. Evenencrypted passwords traveling the wire are vulnerable to eavesdroppingwhen they are captured and replayed, convincing the server thatthey are authorized users. This is another reason why single-usepasswords provide more security.<P>The Challenge Handshake Authentication Protocol (CHAP), <I>a challenge-response</I>system, does not completely eliminate sending clear text over

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧洲日本在线| 欧美日韩精品三区| 中文文精品字幕一区二区| 精品一区二区三区免费播放 | 国产三级精品视频| 国产精一区二区三区| 国产欧美日韩卡一| 99久久久国产精品| 亚洲狠狠丁香婷婷综合久久久| 在线观看视频一区二区欧美日韩| 亚洲一区二区三区视频在线 | 欧美日韩中文一区| 图片区小说区区亚洲影院| 日韩一区二区高清| 国产福利一区在线| 亚洲激情中文1区| 欧美丰满少妇xxxbbb| 激情国产一区二区 | 在线一区二区观看| 亚洲18色成人| 久久影院午夜论| av电影在线观看一区| 午夜激情综合网| 久久久久久久久久久99999| 99九九99九九九视频精品| 午夜久久久久久电影| 久久久综合视频| 欧美性色欧美a在线播放| 九九在线精品视频| 亚洲精品v日韩精品| 日韩精品一区二区三区蜜臀| 成人动漫精品一区二区| 日本亚洲视频在线| 中文字幕一区二区三区四区| 欧美一区二区在线免费播放| 丁香六月久久综合狠狠色| 午夜精品久久久久久久99水蜜桃| 国产精品色在线观看| 91麻豆精品国产91久久久更新时间 | 国产精品美女久久久久aⅴ| 欧美日韩亚洲综合一区| 成人18视频日本| 青青草精品视频| 亚洲日本在线天堂| 久久久av毛片精品| 欧美一区二区三区思思人| 99久久精品费精品国产一区二区| 蜜臂av日日欢夜夜爽一区| 一区二区三区免费网站| 国产拍揄自揄精品视频麻豆| 欧美一区二区福利在线| 色成人在线视频| 9i看片成人免费高清| 国产精选一区二区三区| 蜜桃精品视频在线观看| 亚洲一区在线视频观看| 综合久久国产九一剧情麻豆| 国产日产精品一区| 久久尤物电影视频在线观看| 日韩一区二区三区视频| 欧美日韩一级黄| 欧美色男人天堂| 日本福利一区二区| aaa欧美色吧激情视频| 国产精品69久久久久水密桃 | 高清在线不卡av| 久久精品国产**网站演员| 天天综合日日夜夜精品| 亚洲在线成人精品| 亚洲最色的网站| 一区二区三区四区五区视频在线观看| 国产精品久久久久9999吃药| 久久精品日韩一区二区三区| 久久嫩草精品久久久精品| 久久久久青草大香线综合精品| 2020国产成人综合网| 久久久青草青青国产亚洲免观| 精品国产一区a| 日本精品裸体写真集在线观看| 91免费国产在线观看| 91九色最新地址| 欧美少妇性性性| 在线不卡的av| 欧美日本精品一区二区三区| 91精品在线免费观看| 日韩欧美高清dvd碟片| 26uuu亚洲| 中文字幕精品一区二区精品绿巨人 | 欧美成人性战久久| 日韩欧美国产成人一区二区| 精品剧情在线观看| 国产亚洲欧美在线| 亚洲欧美偷拍三级| 亚洲h在线观看| 久久精品99久久久| 国产91精品一区二区麻豆亚洲| eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 日韩亚洲欧美综合| 欧美精品一区二| 亚洲天堂成人在线观看| 亚洲一区二区三区国产| 日韩**一区毛片| 国产一二精品视频| 日本精品视频一区二区三区| 91精品在线一区二区| 欧美经典三级视频一区二区三区| 亚洲人吸女人奶水| 另类小说图片综合网| 成人精品免费看| 欧美探花视频资源| 久久久久久久久久久久久女国产乱| 国产精品的网站| 日本伊人精品一区二区三区观看方式| 国产一区二区成人久久免费影院 | 经典一区二区三区| 99久久婷婷国产综合精品| 欧美午夜视频网站| 国产欧美视频一区二区| 亚洲综合色区另类av| 国产一区二区调教| 欧美在线观看你懂的| 精品粉嫩aⅴ一区二区三区四区| 最近中文字幕一区二区三区| 日本不卡免费在线视频| www.亚洲国产| 欧美成人艳星乳罩| 亚洲影视资源网| 懂色av一区二区夜夜嗨| 欧美精品第1页| 中文字幕一区二区三区视频| 免费日韩伦理电影| 欧美亚洲丝袜传媒另类| 日本一区二区三区dvd视频在线| 日韩专区一卡二卡| 成人av片在线观看| 久久先锋影音av鲁色资源网| 亚洲影视在线播放| 99精品国产91久久久久久| 日韩免费成人网| 亚欧色一区w666天堂| 99精品久久99久久久久| 久久久久久久综合| 麻豆91精品视频| 欧美欧美欧美欧美首页| 亚洲欧洲色图综合| 国产成人a级片| 精品国产第一区二区三区观看体验| 一个色综合av| 99精品视频一区| 国产精品毛片高清在线完整版| 久久av老司机精品网站导航| 欧美精品色综合| 亚洲国产成人精品视频| 色偷偷88欧美精品久久久| 成人免费在线视频| 成人黄色小视频| 国产精品麻豆视频| 成人精品电影在线观看| 国产日韩av一区| 成人免费视频播放| 久久精品欧美日韩| 国产毛片精品国产一区二区三区| 日韩一级精品视频在线观看| 美腿丝袜亚洲色图| 日韩精品一区二区三区中文精品| 三级欧美在线一区| 日韩一区二区免费在线观看| 日本aⅴ免费视频一区二区三区| 91精品视频网| 蜜臀久久久久久久| 精品日韩在线观看| 久久成人羞羞网站| 欧美精品一区二区在线观看| 国产一区二区三区日韩| 国产农村妇女精品| av在线播放成人| 一区二区三区精品视频| 色老汉一区二区三区| 午夜精品国产更新| 日韩女优视频免费观看| 国产剧情av麻豆香蕉精品| 国产精品日产欧美久久久久| 91天堂素人约啪| 日韩精彩视频在线观看| 欧美成人猛片aaaaaaa| 国产乱国产乱300精品| 国产精品欧美一级免费| 91成人国产精品| 久久国产日韩欧美精品| 国产性色一区二区| 色综合久久天天| 日韩中文字幕区一区有砖一区| 日韩免费高清电影| av在线这里只有精品| 亚洲国产日韩a在线播放| 91麻豆精品国产91久久久久久久久 | 亚洲成av人综合在线观看| 3d动漫精品啪啪| 国产精品一区二区在线看| 亚洲裸体xxx|