First page Back Continue Last page Graphics
Password Selection Strategies
Reactive password checking
- System runs its own password cracker
- Resource intensive
- Existing passwords remain vulnerable until reactive checker finds them
Proactive password checking
- Password selection is guided by the system
- Strike a balance between user accessibility and strength
- May provide guidance to password crackers (what not to try)
- Dictionary of bad passwords (space and time problem)