0% found this document useful (0 votes)
8 views2 pages

Summary Sheet

Password managers offer a secure solution for storing and managing login credentials by using robust encryption and allowing unique passwords for each account. They automate login processes and synchronize across devices. Some integrate two-factor authentication and security alerts to further protect stored information. Passwords have evolved from early military uses to widespread computing applications, and security techniques like salting and hashing now enhance password protection.

Uploaded by

thomas.anthoard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

Summary Sheet

Password managers offer a secure solution for storing and managing login credentials by using robust encryption and allowing unique passwords for each account. They automate login processes and synchronize across devices. Some integrate two-factor authentication and security alerts to further protect stored information. Passwords have evolved from early military uses to widespread computing applications, and security techniques like salting and hashing now enhance password protection.

Uploaded by

thomas.anthoard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Summary sheet

Password Managers
 Password managers offer a secure solution for storing and managing login
credentials.
 They use robust encryption and allow the creation of complex, unique passwords
for each account.
 They automate the login process and offer universal synchronization, allowing
users to access their passwords from any connected device.
 Some integrate two-factor authentication and security alert features, enhancing
the protection of stored information.
 It’s crucial to choose a reputable and reliable password manager to ensure the
confidentiality of stored information.

Password Security Risks


 Password security risks are high when using ‘weak’ passwords that can be
guessed.
 The main risks include financial loss or scams, data and identity theft, malware
spread, and damage to reputation or harassment.
 To secure a password, it should be over 8 characters long, not related to the
user’s name, and include special characters, numbers, and capital letters.

History of Passwords
 The term “password” has military origins. The “words of orders” include the
“word of summons” (i.e., the agreed question) and the “password” (i.e., the
corresponding answer).
 In the computing context, Fernando Corbató created the first computer accounts
protected by passwords at MIT (Massachusetts Institute of Technology) in the
1960s.
 With the evolution of technology, methods like hashing and salting were
introduced to enhance password security.
 Today, passwords are widely used in various fields including computing,
telephony, and banking.

Security Techniques: Salting and Hashing


 Salting is a security technique in which a random string of characters is added to
the password before it is hashed, to make the hash more secure.
 Hashing is a mathematical and computerized process that transforms data into
a random string of characters.
 The first password-based security system created by Fernando Corbató is a
system where users logging into his CTSS (Compatible Time-Sharing System)
with their respective logins can manage their own sets of files on terminals
connected to the university’s mainframe computer.
 Despite this early user-centric authentication mechanism’s security flaws, it
directly influenced how passwords would be utilized by computer scientists and
ordinary people in the decades to come.

Virgil B ; Thomas A ; Alexandre F.A

You might also like