Authentication
Authentication methods: Passwords
Often, weak passwords protect more important systems
Users must be forced to pick long passwords containing case changes and numerals, such as Tri6Vial
Previous slide
Next slide
Back to first slide
View graphic version