en:it-security:passwords

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
en:it-security:passwords [2023/11/07 16:19] – Automatic translation 82.80.249.212en:it-security:passwords [2024/02/05 00:20] – Automatic translation 135.181.137.61
Line 1: Line 1:
 +{{tag>deutsch startpage it-security blog}}
 ====== Secure passwords ====== ====== Secure passwords ======
  
-| Version | 3.|+| Version | 3.|
  
 ===== 1.0 Introduction ===== ===== 1.0 Introduction =====
  
-Passwords are becoming increasingly important these days. Online banking, FTP access and website accounts force us to have more and more passwords. Of course you can manage everything with a password, but I doubt whether this is in the interest of security. In this tutorial, I will explain what a password should look like and what you should bear in mind when managing it.+Passwords are becoming increasingly important these days. Online banking, FTP access and website accounts are forcing us to have more and more passwords. Of course you can manage everything with a password, but I doubt whether this is in the interest of security. In this tutorial, I will explain what a password should look like and what you should bear in mind when managing it.
  
 ===== 2.0 Dealing with passwords ===== ===== 2.0 Dealing with passwords =====
Line 43: Line 44:
 ==== 2.4 Password programmes ==== ==== 2.4 Password programmes ====
  
-Password programmes are usually databases that store data in a clearly organised way.+Password programmes are usually databases that store data in a clearly organised manner.
 What must such a programme be able to do? What must such a programme be able to do?
   - A password generator should be integrated   - A password generator should be integrated
Line 58: Line 59:
 A secure password must fulfil certain requirements. We will now look at these in more detail. A secure password must fulfil certain requirements. We will now look at these in more detail.
  
 +<mermaid> 
 +  flowchart TD 
 +      A[Secure password] 
 +      B[Letters] 
 +      C[Numbers] 
 +      D[Special characters] 
 +      E[Length] 
 +      B1[A-Z] 
 +      B2[a-z] 
 +      C1[0-9] 
 +      D1[+-!?_-] 
 +      E1[12] 
 +      A-->B 
 +      A-->C 
 +      A-->D 
 +      A-->E 
 +      B-->B1 
 +      B-->B2 
 +      C-->C1 
 +      D-->D1 
 +      E--minimum-->E1 
 +</mermaid>
  
 ==== 3.1 Passwords should not look like this ==== ==== 3.1 Passwords should not look like this ====
Line 85: Line 107:
  
 <code text> <code text>
-Dies ist ein Satz, der mit der Zahl 0 und 9+Ich bilde einen Satz mit Groß- & Kleinbuchstaben und den Zahlen 0 und 9
 </code> </code>
  
-We take the first letters of the sentence and the numbers and form the password:+We take the first letters of the sentence, the special character and the numbers and form the password:
  
 <code text> <code text>
-DieSdmdZ0u9+IbeSmG&KudZ0u9
 </code> </code>
  
Line 101: Line 123:
  
   * Passwords should always be sent via a [[https://de.wikipedia.org/wiki/Transport_Layer_Security|SSL]] connection   * Passwords should always be sent via a [[https://de.wikipedia.org/wiki/Transport_Layer_Security|SSL]] connection
-  * Use a different password for each site +  * Use a different password for each page 
-  * Follow the basic [[windows:security:basics|Windows security tips]] +  * The basics [[windows:security_basics|Windows security tips]] 
   * Never share passwords   * Never share passwords
  
Line 113: Line 135:
 The days when we could carelessly handle access data are over. Phishing strategies and hacker attacks are on the rise and you have to adapt to the trend in order to counteract them. Of course, there is never a 100% guarantee of security, but you can at least take good precautions to avoid becoming a victim of data theft. The days when we could carelessly handle access data are over. Phishing strategies and hacker attacks are on the rise and you have to adapt to the trend in order to counteract them. Of course, there is never a 100% guarantee of security, but you can at least take good precautions to avoid becoming a victim of data theft.
  
-There is a practical tool for generating passwords [[software:omegapass|here in the wiki]].+There is a practical tool for generating passwords [[en:software:omegapass|here in the wiki]].
  • en/it-security/passwords.txt
  • Last modified: 2024/02/05 08:33
  • by psycore