Chapter 5

Passwords

IN THIS CHAPTER

Bullet Selecting passwords

Bullet Discovering how often you need to change passwords — or not

Bullet Storing passwords

Bullet Finding alternatives to passwords

Most people alive today are familiar with the concept of passwords and with the use of passwords in the realm of cybersecurity. Yet, there are so many misconceptions about passwords, and misinformation about passwords has spread like wildfire, often leading to people undermining their own security with poor password practices, sometimes even done in the name of improving cybersecurity.

In this chapter, you discover some best practices vis-à-vis passwords. These practices should help you both maximize your own security and maintain reasonable ease of use.

Passwords: The Primary Form of Authentication

Password authentication refers to the process of verifying the identity of users (whether human or computer process) by asking users to supply a password — that is, a previously agreed-upon secret piece of information — that ostensibly the party authenticating would only know if they were truly the party who it claimed ...

Get Cybersecurity All-in-One For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.