Password zakhistu special tributes. A reliable password is a guarantee for the protection of personal data

What benefits are presented before organizing password protection of information in lighting installation?

Organization technical safety The process of changing, changing and assigning passwords, as well as monitoring the work with passwords in the lighting installation should be completely entrusted to the system administrator.

Specials passwords It is necessary to generate and distribute centrally. However, users of information systems can choose them independently with the following benefits:

  1. The password length must be at least 8 characters;
  2. In the middle of the symbols there are letters (in the upper and lower registers) and numbers;
  3. the password is not responsible for easy identification of symbols (names, nicknames, nicknames, slang words, etc.), sequence of symbols and signs, common shorthands, abbreviations, names of your creatures, car numbers, telephone numbers and other associated letters and signs that can be guessed, rely on information about the merchant;
  4. Koristuvach has no right to disclose his personal password to anyone.

Since the generation of special passwords for customers is centralized, the responsibility for their correctness rests on system administrator I will make a light mortgage.

Due to the obvious technological necessity of changing the password of the worker for his work, it is recommended to change the password first and transfer it to a special person who is responsible for the information without I bake in a sealed envelope. Sealed envelopes with passwords are kept in a safe.

Once employed, the role of the employee becomes more important (retirement, transition to another job, etc.) system administrator You are responsible for deleting your account record immediately after finishing your remaining session. information system.

Terminal (scheduled) change of passwords must be carried out from time to time by administrators of the information system and other workers who are responsible for managing the password guard.

It is recommended to develop instructions for organizing password protection of information that password holders may be aware of upon signature. In the instructions, it is necessary to identify security steps that must be taken to prevent the flow of information. Let us introduce a more precise formula.
It is prohibited to write down passwords on paper, files or other media. Before entering the password, the koristuvach is not guilty of speaking out loud.

It is prohibited to inform other users of your special password and register them in the system under your own password.
Saving a password on a paper note is only allowed in a safe.

Password owners are responsible for violating passwords that do not comply with the installed capabilities, as well as for disclosing password information.

Official dzherelo

How monitoring works information security automated systems that collect personal data in a lighting installation? Monitoring the performance of hardware components of automated systems that process personal data occurs during their administration and during maintenance work. The largest system components (servers, active Merezheve obladnannya) must be monitored continuously within the framework of the work of administrators of peripheral systems.

Monitoring the password protection transmits: - setting of password strings (no more than 3 months); periodic (at least once a month) verification of customer passwords for a number of characters and the obvious method of identifying weak passwords that are easy to guess or decrypt using additional specialized passwords software features(password hackers).

Integrity monitoring software security includes offensive actions:

  1. verification of check sums digital signatures directories and files of certified software products under the hour of acquisition operating system;
  2. identification of duplicate customer identifiers;
  3. renovation system files system administrators with backup copies in case of separation of control sums.

Early and early detection of unauthorized access attempts depends on various features of the operating system and special software features and transmits:

  1. fixation tried it nearby login to the system; system log;
  2. protocol of work and boundary services;
  3. detection of scans of a wide range of boundary ports in a short period of time by identifying boundary analyzers that interact with the system and detect its spillage.

Monitoring of productivity of automation systems, dubbing the personal dignity, is carried out behind the brigades of the corkistuvachiv, pd hour of admiral system systems that conducted a professional robit for viyannnnniy unanquonic access, and the vita -duttes of the producers of the productivity of systems.

Systemic audit vibrates around the block in special situations. This includes conducting safety inspections, testing the system, monitoring changes to system software.

Official dzherelo

  • Federal Law dated July 27, 2006 No. 152-FZ “On Personal Data” (as amended on July 25, 2011)
  • Regulations on the security of personal data during the processing of personal data in information systems, approved. Decree of the Order of the Russian Federation dated November 17, 2007 No. 781
  • Provisions on methods and protection of information in personal data information systems, reg. by order of FSTEC dated 02/05/2010 No. 58

Author of the article

Company Elizaveta, student of MBOU ZOSH No. 28, 11th grade A

Goals

What is the history of passwords?

How do passwords steal data on computers and disks?

How do hackers break passwords?

How can I create a password that is strong enough to protect against evil?

Hypothesis

The password is the most convenient and the most commonly used method of establishing validity, based on the knowledge of the subjects of access.

Zahist danikh for additional computer help

Password history

Password(French parole - word) - this is a secret word or a set of symbols, meanings to confirm specialness or more important. Passwords are often used to protect information from unauthorized access. Most computing systems The combination "coristuvach's name - password" is searched for the verification of the client. Passwords have been searched for the past few hours.

Polybiy means that passwords are stored in Ancient Rome as follows:

Those, by which order will ensure safe passage at night, looks like this: from the ten maniples of the skin of the lust and cavalry that are deployed in the lower part of the street, the commander selects who will volunteer for the war service, and Now go to the podium and take away your password - a wooden sign with the word. He turns around at his side, and then goes through the password and sign to the next commander, who passes the sign to the next commander.

To prevent unauthorized access to data stored on the computer, passwords are checked. The computer allows access to its resources only to those users who are registered and entered correct password. Each individual koristuvach may be allowed access to the singing rooms information resources. In this case, it is possible to register all attempts of unauthorized access.

Protect access to a computer.

Zakhist nalashtuvan koristuvachє in the operating system Windows (if the system is locked, the user is required to enter his password), however, such protection is easily overpowered, and some customers may be forced to enter the password. Login with a password can be set in the program BIOS Setup , the computer is unable to access the operating system unless the correct password has been entered. It is not easy to secure such a security; moreover, you may face serious problems with access to data if you forget your password.

Zakhist data on discs.

Skin disk, folder and file local computer, as well as the computer connected to local measures There may be theft due to unauthorized access. They may have different access rights (repeat, no-read, password), and the rights may be different for different users.

Hacking computer passwords

Password hacking is one of the most widespread types of attacks on information systems, so you can authenticate with a password or the pair “name of the user-password”. The essence of the attack is to obtain the password of a hacker who has the right to enter the system. The advantage of the attack for the attacker lies in the fact that if the password is successfully snatched, all the rights of the user are guaranteed, the account record of any compromise, as well as the login under the account account is called. less suspicion among system administrators. Technically, the attack can be carried out in two ways: through a large number of direct authentication tests in the system, or through the analysis of password hashes, otherwise stolen, for example, through traffic jamming. In this case, the following approaches can be used:

Direct search. Enumerate all possible characters that are valid in the password. For example, the “qwerty” password is often broken, and it is very easy to find it behind the first keys on the keyboard.

Find a dictionary. The method is based on the assumption that in the password there are normal words, be it any language or their combination.

Method of social engineering. Reasons for admission that koristuvach vikorystuvav like the password of a particular account, such as your name or nickname, date of birth, etc. Vasya Pupkin, born December 31, 1999 Often the password type is “vp31121999” or “vp991231”. To carry out the attack, a number of tools were deployed, such as John the Ripper.

Password strength criteria

Considering the approach before carrying out an attack, it is possible to formulate criteria for password strength before it is carried out. The password is not to blame if it is too short, otherwise it will be easily brute-forced. The minimum requirement for all symbols has been expanded to the greatest extent. For these reasons, there is no reason why it should not be formed from numbers alone.

The password is not subject to a word in the dictionary, but we’ll forgive the people, but we’ll ask you to select the dictionary.

The password is not to blame only for secretly accessible information about koristuvach.

As a recommendation, before creating a password, you can select a selection of words with numbers and special characters (#, $, *, etc.), a selection of low-width or meaningless words, and a selection of minimal words.

Visnovok

Passwords are used from the earliest days of their creation until this day. They successfully help us protect information from unauthorized access.

U to the current world In the future, more special data is lost to the Internet. This includes various financial services and benefits. These culprits are under reliable protection.

The protection of these powerful data will be ensured by you, the vikoryists Different passwords, where to store the security of various cloud records. So, how can you create your password in such a way that it is easy to remember and accessible to an evil person?

Expanded benefits

Many hackers around the world do not pay special attention to choosing a safe password, which is why they become victims of Internet scammers who hack their cloud records after 5-6 attempts. Many fateful koristuvachs vikoryst use the simplest combinations – 1234567, 12345554321, 1q2w3e4r5t6y: thereby setting themselves up for the threat of evil.

Most cyber security experts identify two main criteria for a secure password – complexity and strength. In my opinion, when creating a password, you need to use a long combination of different characters - numbers, letters, symbols, division marks.

How to create passwords correctly

  • Vikorist more than 8 characters
  • For skin regional registration recover your unique password, scraps if you change the same password on all cloud accounts, if one of them is broken, you can unlock other cloud records yourself
  • You should change your passwords periodically – at least once every 3 months. Why set up automatic guessing so you don’t forget about such an important procedure?
  • The variety of characters in a password is a barrier to reliability. Please do not hesitate to replace letters with numbers or symbols, for example, “FOR” with “4”.
  • Explore the full range of symbols available on your keyboard.

Also, don’t forget – you need to save your passwords in a place where only you have access.

Please be sure to use your passwords as much as possible:

  • Words of the dictionary, be mine
  • Repetition or symbols placed sequentially one after another. For example: 1234567, 55555, abcde, etc.
  • Passwords for special data on Wikoristan: PIB, date of the people, serial numbers documents too.

Please be sure to create a password with utmost seriousness, so that the remains of what they steal may impair your financial wealth or reputation.

I thank everyone who is amazed at this video!
This is not the first thing, my statue, but in the galusi navchannya of the koristuvachs, do not be afraid of the foolish persha.

In this video and text of the article, I will recognize and show you what to do and what not to do when you enter a password or choose one.

Passwords vary, whether you save them in your head, or write them down on a paper, or... text documents.
Saving passwords in your head means:
passwords will be:
1. the dozhina is small;
2. from different resources, however,
And if you register in the mail, and then in the chat, then people after the evil chat deny access to your mail, which is not good...

saving passwords on your paper is not an option, even if you don’t better for the first one, and besides, point out the books on paper noses we're going away,

electronic media, then please save passwords in text view.

This method also has some advantages.
Nedolyk: an attacker who has denied access to a file with passwords will recognize all resources and can deny access under your name.

Positive benefits: deny access to resources (third-party storage) as much as possible folding passwords and don’t be afraid to forget them
Can be painted Danish method, having memorized 1 folding 10-digit password or more,
And just use it to decrypt a password-protected archive with passwords.
I'll show you later...

And now I’ll show you how easily you can decrypt a normal password.

Nowadays, a lot of encryption algorithms have been invented. The most popular in my opinion is MD5 and its modification.

For example, use different passwords and their hashes, and try to decrypt them, and see how long it takes.

And so, now we can decipher and divulge at any hour...

At first, the vikorysts are deprived of numbers, and then the complexity increases...

Parts of a second...
Same...
The same thing, but we know that the password contains only numbers, and if it does not contain signs, it would take much more than an hour.
Coming password...
We didn’t know the password behind the numbers... symbols are included... lowercase...
added 1 character (not a number and that’s how the process did it)
On a weak machine, a password of 8 characters with a combination of upper and lower case letters will be decrypted even more quickly, and without any modifications to MD5.
It’s a pity that you can’t use additional symbols on every site/service/server.

Respect to the screen, as the stench of their vikoristannya would complicate the process of direct search...
The password is practically not affected by these wiki sites, since, of course, they do not need to use supercomputers to decrypt them.

And I promise to show you how you can save passwords to access resources by knowing one password:

It’s very difficult to remember such a password, so it won’t be long before... a little later
w1W4W5a$4PYi

If you change such a password, your passwords will be with you.
You can shorten it like I said in up to 10 characters... Well then...
It’s easier to remember, but I don’t think that your passwords will be damaged on purpose
So, in the name of the “Passwords” file, please change the name to something like this...

Axle, master, and that’s it!