Смекни!
smekni.com

Network Security Essay Research Paper 10 INTRODUCTION (стр. 2 из 2)

3) Passwords of all same letters and it should always differ from login name and old password.

4) Never change back to the initial password assigned by the computer services for example IT-Centre. (http://www.8j.net/local_forms/passwd.html)

Appendix C

“Public keys are a common use of asymmetric keys. Though secret keys are easy enough to implement between two users, what if we need to contact many different users, and all of the messages need to be encrypted? It is inefficient to call each person, and make up a new secret key, for each transmission. These calls also jeopardise key security”. (Beyda, 1996)