Chapter 4 - Protection in General-Purpose OS
Chapter 4 - Protection in General-Purpose OS
Chapter 4 - Protection in General-Purpose OS
Chapter 4
Protection in General-
Purpose Operating Systems
User authentication
USER B R - - R X X R W
USER S RW - R R X X R W
USER T - - - R X X R W
SYS_MGR - - - RW OX OX ORW O
USER_SVCS - - - O X X R W
Of those passwords, 86
percent could be uncovered
in about one week's worth
of 24-hour-a-day testing,
using the very generous
estimate of 1 millisecond
per password check.
Users’ Password Choices.
By Mohammed Al-Saleh / JUST
31
Chapter 4
Probable Passwords
Several news articles have claimed that the four most common
passwords are "God," "sex," "love,"and "money“
The COPS, Crack, and SATAN utilities allow an administrator to scan a system for
weak passwords.
People think they can be clever by picking a simple password and replacing certain
characters, such as 0 (zero) for letter O, 1 (one) for letter I or L, 3 (three) for letter E or
@ (at) for letter A. But users aren't the only people who could think up these
substitutions.
Guessing steps: no password, same as user ID, derived from the user name, common
word list, use dictionary, and brute force.