正在加载图片...
Principle 1:Securing the weakest link Table IV.Top 10 most popular passwords of each dataset Rank Tianya Dodonew CSDN Duowan Myspace Singles.org Faithwriters Hak5 123456 123456 123456789 123456 passwordl 123456 123456 QsEfTh22 2 111111 a123456 12345678 111111 abe123 jesus writer 3 000000 123456789 11111111 123456789 fuckyou password jesusl timosha Top 3(%) 5.58% 1.49% 8.15% 5.01% 0.40% 2.10% 1.03% 4.62% 4 123456789 111111 dearbook 123123 monkey1 12345678 christ ike02banaA 5 123123 5201314 00000000 000000 iloveyoul christ blessed 123456 6 123321 123123 123123123 5201314 myspacel love john316 zxczxc 7 5201314 a321654 1234567890 123321 fuckyoul princess jesuschrist 123456789 8 12345678 12345 88888888 a123456 numberl jesusl password westside 9 666666 000000 111111111 suibian footballl sunshine heaven ZVjmHgC355 10 111222tianya 123456a 147258369 12345678 nicolel 1234567 faithwriters Kj7Gt65F Top10(%) 7.42% 3.28% 10.44% 6.78% 0.78% 3.409% 2.17% 7.20% Credit card example -threats to credit card numbers include: eavesdropping on the network stealing from customer database me loosing my wallet-weakest link Solution:risk analysis. -CSE825 4CSE825 4 Principle 1: Securing the weakest link  Credit card example - threats to credit card numbers include: ● eavesdropping on the network ● stealing from customer database ● me loosing my wallet – weakest link  Solution: risk analysis
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有