Security:ClearTextPasswords: Difference between revisions
No edit summary |
mNo edit summary |
||
Line 13: | Line 13: | ||
Did you know that there's a so called: | Did you know that there's a so called: | ||
=== Code of ethics === | === Code of ethics === | ||
https://de.wikipedia.org/wiki/Certified_Information_Systems_Security_Professional#Code_of_Ethics | https://de.wikipedia.org/wiki/Certified_Information_Systems_Security_Professional#Code_of_Ethics <br> | ||
"Handelt ein CISSP nicht nach diesen Grundsätzen, kann er jederzeit durch einen anderen CISSP bei der (ISC)² gemeldet werden." | "Handelt ein CISSP nicht nach diesen Grundsätzen, kann er jederzeit durch einen anderen CISSP bei der (ISC)² gemeldet werden." | ||
Revision as of 08:11, 14 August 2020
This is a draft, the resources below clearly tell that clear text passwords in digital information systems are a NO-GO regardless what's in some "specification sheet" or other service provider agreements ;-)
CISSP
Well, it's one of the CISSP questions, but let's have a closer look:
- What is the BEST method of storing passwords for a system:
- password-protected file
- file restricted to one individual
- one-way encrypted file
- two-way encrypted file
You may have guessed it already: an one-way encrypted file is the correct answer. Of course there are other options so an encrypted password in the credential file works out well, too.
So if you're service provider keeps telling you that clear text passwords (credentials) don't matter at all, that's a killer argument ;-)
Did you know that there's a so called:
Code of ethics
https://de.wikipedia.org/wiki/Certified_Information_Systems_Security_Professional#Code_of_Ethics
"Handelt ein CISSP nicht nach diesen Grundsätzen, kann er jederzeit durch einen anderen CISSP bei der (ISC)² gemeldet werden."
Books
Computer Security Basics
Rick Lehtinen, Deborah Russel & G.T. Gangemi Sr. ; Released June 2006 ; ISBN-13: 978-0596006693
Page 65-66