Hack-Proofing Your Passwords: Why You Shouldn't Rely on Encryption Alone to Protect the Weakest Link
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Sacramento 2018 ,
2018
It doesn't matter if you're a high-level security specialist, or a data entry clerk, the passwords you use are likely the weakest links in the chain of your organization's security. This may be especially true if your organization has not implemented advances like passphrases, Multi-Factor Authentication, or biometrics, to further strengthen this chain. An 8-character password is the elephant in the room, with regard to System z security.
What can you possibly do to make your passwords hack-proof?
This presentation meanders through the mechanics of passwords in the z/OS environment, startles you with the statistics of passwords mathematics, and gives you some guidelines to help prevent would-be hackers from exploiting this weakest link.-Richard Faulhaber-NewEra Software, Inc.
Back to Proceedings File Library