Editor's note: This is a Web-exclusive exhibit for " Password Management Strategies for Safer Systems ."
Unencrypted characters in, for example, a password.
To decode an encrypted password.
|Social Engineering|| |
A hacker’s use of a plausible pretext to intimidate or trick an employee into divulging a password without proper authorization.
|Dictionary Attack|| |
A hacker-originated automated process that repeatedly attempts to log on to a system, using many thousands of words (contained in the hacker’s ad hoc “dictionary”) as potential passwords.
A process that follows a mathematical formula to convert a user’s password into an encrypted alphanumeric value. Despite its harder-to-crack encryption, hashing has security weaknesses.
|Rainbow Table|| |
Hacker-created lists of the precomputed hashed values of thousands of words that users may have chosen as passwords. Hackers search rainbow tables for matches with hashed passwords they encounter in password tables. Often hackers quickly find a match—and thereby crack—hashed passwords.
A metaphorical term for a random array of characters that will be attached to a password to strengthen it against hackers.
|Salted Hashing|| |
A technique to make passwords harder to crack. It consists of adding a salt value to a password, and then hashing it.
|Penetration Test|| |
An exercise in which a knowledgeable third party you hire attempts to break into your system and shares with you the results of the attempt.