Join Lisa Bock for an in-depth discussion in this video Understanding the threat of password attacks, part of IT Security Foundations: Network Security.
- A password is something you know.…It's a series of numbers and characters…and it provides access control.…If you obtain someone's password…you will have the same rights as the user.…Now there are a number of different password attacks.…We'll talk about a few of them…and then I'll show you some examples.…One way to do a password attack…is using a keystroke logger.…A keystroke logger is either…a physical device or even software.…A keystroke logger captures keystrokes,…well with the goal of obtaining information.…
You'll probably get a lot of information,…but you might capture a username and password.…A brute force attack.…Brute force is trial-and-error and method.…All possible combinations are tried.…A dictionary attack is a subset of a brute force attack,…where all common passwords are tried.…Now, you shouldn't use a common password,…you should use a complex password.…But let's take a look at 25 of the most common…passwords of 2014.…
I'm at this website here,…and it lists 25 of the most popular passwords of 2014.…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Explain how Network Access Protection (NAP) works.
- Recall how server and domain isolation provides extra protection.
- Describe how Network Address Translation (NAT) works.
- Differentiate between DNSSec and DNS.
- Recognize the threat of password attacks.
- Summarize how antivirus software protects your system against malware.
- Cite the three levels for software-restriction policies.