What is the primary goal when creating a password?
To create a password with an increased amount of entropy
Entropy describes how unpredictable a password might be.
What characteristics should an ideal password contain?
Uppercase letters, lowercase letters, numbers, and special characters
This combination increases the complexity and security of the password.
What is the recommended minimum length for a password?
At least eight characters
Password length requirements are increasing as processing speeds improve.
How often do many systems require password changes?
Every 30, 60, or 90 days
Some critical systems may require changes as frequently as every 7 to 15 days.
What happens if a password expires and is not changed?
The user will not be able to log in to that account.
What is a recommended best practice regarding passwords for multiple accounts?
Use a different password for each account.
What is the purpose of a password manager?
To store all of your passwords in one single database.
What additional security measures do password managers often implement?
Encryption of stored information and multifactor authentication.
What feature allows password managers to help create unique passwords?
Automatic password generation.
True or False: Many people take full advantage of password managers.
False.
What is a potential benefit of passwordless authentication?
It solves the problem of password reuse.
How might you currently be using passwordless authentication?
Using face recognition to unlock a mobile phone.
What is just-in-time permission?
Temporary administrative access granted for a limited time.
What does just-in-time permission help mitigate?
The risk of an attacker gaining permanent administrator access.
What is the role of a central clearinghouse in just-in-time permissions?
To allow or deny access based on set security policies.
What type of credentials does the central clearinghouse manage?
Primary credentials for access to systems.
What happens to temporary credentials after their use?
They can be deleted after the session is complete.
Fill in the blank: The process of creating new temporary credentials based on primary credentials is called _______.
Just-in-time permissions.