Interception - Passwords can be intercepted as they travel over a network, Brute Force - Automated guessing of billions of passwords until the correct one is found, Key Logging - Installing a keylogger to intercept passords when they are being entered, Manual Guessing - Easy to guess details e.g. dates, family names & pet names, Sholder Surfing - Observing someone as they are typing their password, Stealing Passwords - Insecurely stored passwords can be stolen i.e. written down passwords., Stealing Hashes - Stolen hash files can be broken to recover the original passwords, Data Breaches - Using passwords leaked from data breaches to attack other systems, Password Spraying - Trying a small number of commmonly-used passwords to access a large number of accounts, Phishing & Coercion - Using social engineering techniques to trick people into revealing their passwords,

لوحة الصدارة

النمط البصري

الخيارات

تبديل القالب

استعادة الحفظ التلقائي: ؟