Your password to everything
There are few people around in the developed world today who would argue that the importance of computer systems has decreased over the last few years. There are even fewer who would be likely to say that the significance of such systems will diminish any time soon.
Enterprises, Organisations, Governments and individuals all rely, to a greater or lesser degree, on the computers and the myriad of applications that they host. With so many people now routinely carrying out significant transactions via the Internet, why has so little attention been paid to the fundamental plank on which all systems ultimately depend for their security, namely identity management, and why is so little action taken to prevent, or at least deter, identity theft?
By Tony Lock at IT Director.
[ Read more ]
- Article: How to Use Passwords Securely (22 April 2003)
- Article: Implementing Basic Security Measures (14 April 2003)
- Article: Cracking OpenVMS Passwords with John the Ripper (28 November 2002)
- Article: What makes a good Password? (13 November 2002)
- Article: A Note on Proactive Password Checking (24 September 2002)
- Article: Basic security with passwords (24 May 2002)
- Article: Passwords - The Weak Link (1 April 2002)