Page 1480 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1480

One of the best ways to prevent password-based attacks is

                  to supplement passwords with other authentication techniques.
                  This approach, known as multifactor authentication, is discussed

                  in Chapter 13.


               One of the mistakes made by overzealous security administrators is to
               create a series of strong passwords and then assign them to users (who

               are then prevented from changing their password). At first glance, this
               seems to be a sound security policy. However, the first thing a user will
               do when they receive a password like 1mf0A8flt is write it down on a
               sticky note and put it under their computer keyboard. Whoops!
               Security just went out the window (or under the keyboard)!
   1475   1476   1477   1478   1479   1480   1481   1482   1483   1484   1485