🌊 SYO-501 | Glossary

 


MASTERING SECURITY BASICS

Use casedescribes a goal an organisation wants to achieve, engineers use this in systems analysis and software development to identify and clarify requirements to achieve the goal
Common naming strategyfor use case, verb-noun format (e.g. place order)
Actorsthis use case element could be a registered user with a shipping and billing information, a new customer with no information saved, or the billing system(bills for the order)/fullfillment system (processes and ships the order)
Preconditionthis use case element must occur before the process can start, like selecting an item first before placing the order
Triggerthis use case element could be when you click the shopping cart to start the process
Postconditionthis use case element could occur after triggering the process like receiving an acknowledgement of the order, steps to bill the user and shipping department takes steps to ship the product
Normal Flowthis use case element could occur when you see a list of each step in a specific order once you pick an order and ends with completing the order and exiting the system
Alternate flowthis use case element could occur when user might want to use a different credit card or shipping address, and even cancel the whole process or just abandon it
Confidentialitythis prevents the unauthorised disclosure of data
Encryptionscrambles data to make it unreadable by unauthorised personnel, only the authorised can decrypt this e.g. encrypting emails protects the confidentiality the best
PIIpersonally identifiable information, like medical information or credit card data
Access Controlsidentification, authentication, and authorisation combined provide access controls and help ensure that only authorised personnel can access data
Identificationwhen users claim an identity with a unique username
Authenticationwhen users prove their identity with authentication such as password
Authorisationwhen you can grant or restrict access to resources using an authorisation method such as permissions
Steganographythis is the practice of hiding data within data
Obfuscationattempts to make something unclear or difficult to understand
IT Security Obfuscationin this context, this is called security by obscurity or security through obscurity, note that security experts rejects this as reliable for maintaining security
Steganography examplea common form of obfuscation, embed a hidden message in an image by modifying certain bits within the file, or when you add a textfile to an image file using winrar and windows command line
Integrityprovides assurances that data has not changed, and when unauthorised users, malicious software (malware), system/human errors modify, tampers or corrupts the data, the data has lost integrity
Hashingsimply a number created by executing a hashing algorithm against data, such as a file or message, if the data never changes the resulting hash will always be the same, which means the data hasn't lost data integrity
Hashing examplehomer sends a message and hash to marge, the message was "hello" with hash 123, marge calculates the hash and compare her hash from Homer, if it's similar, then it hasn't lost its Data Integrity- Otherwise, if different like 456, Data integrity would've been lost
Hashing disadvantageit doesn't tell you what modified the message
Hash usecan be used on email, data files- sometimes email programs use message authentication code, MAC, instead of hash with the same concept to verify integrity
Hashing advantageit can also check if integrity is maintained during download/transfer- some programs would detect by comparing source hash and desination hash- once detected its reported to the user
Hashing example part twowebsite admin can calculate and post the hash of a file on the site- users can manually calculate the hash of the file after downloading it and compare the hash- if file was infected by virus than hash would be different- you can use freeware like md5sum.exe to calculate MD5 hashes
Hashing example part threepossible to lose data integrity through human error- database admin needs to modify a significant amount of data- admin can write a script for a bulk update- however if the script is faulty it can corrupt/change the database losing integrity
Key concepts of integrity part oneintegrity provides assurances that data has not been modified, tampered with or corrupted- might be due to unauthorised or unintended changes/human error
Key concepts of integrity part twohashing verifies integrity, a hash is a numeric value created by executing a hashing algorithm against a message or file- hashes are created at the source and destination or at two different times like first and fifteenth of the month
Digital signaturesimilar in concept to a handwritten signature- it provides authentication- if the signature arrives intact, it authenticates the sender
Digital signature advantageprevents attackers from impersonating others and sending malicious emails- attacker could make an email look like it came from Lisa and include a link to a malicious site urging Bart to click it
Non-repudiationdigital signatures provide non-repudiation, Lisa would not be able to deny sending an email because the digital signature would prove it
Digital signature requirementrequires certificates
Availabilityindicates that data and services are available when needed- some organisations during 8-5pm mon-fri, some organisations 24 hours a day
Availability implementationorganisations commonly implement redundancy and fault-tolerant methods to ensure high levels of availability for key systems- organisations ensure systems stay up to date with current patches to ensure that software bugs dont affect availability
Redundancyadds duplication to critical systems and provides fault tolerance-
SPOFSingle Point of Failure
Common goal of Redundancy and Fault ToleranceIf an SPOF fails, the entire system can fail, so a common goal is to remove SPOF e.g. if server has a single drive, the drive is an SPOF cos its failure takes down the server
Disc redundanciesFault-tolerant discs, such as RAID-1 (mirroring), RAID-5 (striping with parity), and RAID-10 (striping with a mirror), allow a system to continue to operate even if a disc fails
Server redundanciesFailover clusters include redundant servers and ensure a service will continue to operate, even if a server fails
Server redundancies (in fail over clusters)the service switches from the failed server in a cluster to an operational server in the same cluster
Virtualisationcan increase availability of servers by reducing unplanned downtime
Load balancinguses multiple servers to support a single service, such as a high-volume web site- this can increase the availability of web sites and web-based applications
Site redundanciesif a site can no longer function due to a disaster, such as a fire, flood, hurricane, or earthquake, the organisation can move critical systems to an alternate site
Hot siteready and available 24/7
Cold sitelocation where equipment, data and personnel can be moved to when needed
Warm sitea compromise between a hot site and cold site
Backupsif personnel back up important data, they can restore it if the original data is lost
Data loss causecorruption, deletion, application errors, human error, and even hungry gremlins that just randomly decide to eat your data- without backup data is lost forever
Alternate poweruninterruptible power supplies (UPSs) and power generators can provide power to key systems even if commercial power fails
Cooling systemsheating, ventilation, and air conditioning (HVAC) systems improve the availability of systems by reducing outages from overheating
Patchinganother method of ensuring systems stay available is with patching- software bugs cause a wide range of problems, including security issues and even random crashes- software vendors discover the bugs, develop and release code that patches or resolves these problems- organisations commonly implement patch management programs to ensure systems are up to date
Resource vs Security ConstraintsWhy not encrypt all the data? The reason is that encryption consumes resources
Resource vs Security Constraints ExampleIf there was 260 characters encrypted it will go up to 360 characters, an increase of 40%. This means the company would need 40% more disk space. Additionally, processing this will consume more memory. Also takes more time and power to encrypt and decrypt data. Security experts and executives might disagree on whether it's worth it
Riskthe possibility or likelihood of a threat exploiting a vulnerability resulting in a loss
Threatany circumstance or event that has the potential to compromise confidentiality, integrity or availability
Vulnerabilitya weakness, it can be in the hardware, the software, configuration, or even the users operating the system
Security incidentan adverse event or series of events that can negatively affect the confidentiality, integrity or availability of an organisations
Risk mitigationreduces the chances that a threat will exploit a vulnerability or impact of risk through security controls e.g. reduce access control so if employees disgruntled, no harm
Security incidentan adverse event or series of events that can negatively affect the confidentiality, integrity or availability of an organisations
Control Types / Security Controlsmost security controls can be classified as technical (technology), administrative (admin or management methods) or physical (things you can touch)
Technical controlsuse technology to reduce vulnerabilities, admin installs and configures a technical control and the technical control then provides the protection automatically
Technical control: Encryptionstrong technical control used to protect the confidentiality of data transferred over network, stored on devices servers, desktop computers and mobile
Technical control: Antivirus softwareonce installed this provides protection against malware infection
Technical control: Intrusion detection systems (IDSs) and Intrusion prevention systems (IPSs)strong technical control used to protect the confidentiality of data transferred over network, stored on devices servers, desktop computers and mobile
Technical control: Network Firewallrestrict network traffic going in and out of a network
Technical control: Least privilegewhen individuals are granted only the privileges they need
Administrative Controlsuse methods mandated by organisational policies or other guidelines
Administrative control: Risk assessmenthelps quantify and qualify risks within an organisation to focus on a serious task
Risk assessment: Quantitative Risk assessmentuses cost and asset values to quantify risk through monetary values
Risk assessment: Qualitative Risk assessmentuses judgements to categorise risks based on probability and impact
Administrative control: Vulnerability assessmentattempts to discover current weaknesses/vulnerabilities
Administrative control: Penetration testswhen exploiting vulnerabilities is attempted e.g. server not up to date, penetration test would attempt to compromise the server by exploiting the unpatched vulnerability
Administrative control: focus on physical security and environmentan access list identifies individuals allowed into a secured area, guards verify individuals are on the access list before allowing them in
Administrative control: operational/management controlensures that day to day operations of overall security plan, people implement these controls
Operational/management control: Awareness and trainingtraining helps users maintain password security, clean desk policy, understand threats such as phishing and malware etc.
Operational/management control: Configuration and change managementconfiguration management often uses baselines to ensure that systems start in a secure hardened state, ensures that changes don't result in unintended configuration errors
Operational/management control: Contingency planninghelp plan and prepare for potential system outages, to reduce impact on organisations if an outage occurs
Operational/management control: Media protectionincludes physical media such as USB flash drives, external and internal drives, and backup tapes
Operational/management control: Physical and environmental protectionincludes physical controls like cameras, door locks, and environmental controls like heating and ventilation systems
Physical Controlsany controls that you can physically touch like lighting, signs, fences, security guards and more e.g. fire suppression system that's both physical and technical cos it can detect fire
Control goalstechnical and administrative controls categorise the controls based on how they are implemented
NIST and SP 800 DocumentsNational Institute of Standards and Technology includes a Computer Security Division hosting Information Technology Laboratory (ITL). The ITL publishes Special Publications (SPs) in the 800 series. IT Security professionals use these documents as references to design secure IT systems and networks
NZISMNew Zealand Information Security Manual
Preventive Controlsto prevent security incidents
Hardeningpractice of making a system or application more secure than its default configuration e.g. disabling unnecessary ports, services, implementing secure protocols, using strong passwords (robust password policy), disabling default and unnecessary accounts
Security awareness and trainingensuring that users are aware of security vulnerabilities and threats helps prevent incidents e.g. less likely to be tricked when users understand how social engineers operate
Security guardsguards prevent and deter many attacks, e.g. guards can prevent unauthorised access into secure areas of a building by first verifying user identities
Change managementchange management ensures that changes don't result in unintended outages e.g. administrators submit the change to a change management process (both operational and preventive control)
Account disablement policyan account disablement policy ensures that user accounts are disabled when an employee leaves
Detective Controlsattempts to detect when vulnerabilities have been exploited, resulting in a security incident
Detective controls: Log monitoringseveral different logs record details of activity on systems and networks e.g. firewall logs record details of all traffic that the firewall blocked / automated methods detect potential incidents and report them right after they've occured
Detective controls: Trend analysisto monitor logs to detect trends, e.g. an IDS (Intrusion Detection System) attempts to detect attacks and raise alerts/ alarms, analysing the past to see increase of attack on a specific system
Detective controls: Security auditsecurity audits can examine the security posture of an organisation e.g. password audit determined if password policy is ensuring the use of strong passwords / periodic review of user rights can detect if users have more permissions than they should
Detective controls: Video surveillanceclosed-circuit television (CCTV) system can record activity
Detective controls: Motion detectionmany alarm systems can detect motion from potential intruders and raise alarms
Note about Detective Controlsattempts to detect when vulnerabilities have already been exploited
Detective vs Preventive Controlsdetective can't predict when an incident will occur and it can't prevent it while prevention stops the incident from occuring at all e.g. Video surveillance: detective, Guards: preventive
Corrective controlsattempt to reverse the impact of an incident or problem after it has occured
Corrective controls: IPSIntrusion prevention system attempts to detect attacks and then modify the environment to block the attack from continuing
Corrective controls: Backups and system recoveryensures that personnel can recover data if it is lost or corrupted, system recovery procedures ensures admins can recover a system after failure
Deterrent controlsattempt to discourage a threat
Deterrent controls: cable lockssecuring laptops to furniture with a cable lock deters thieves from stealing the laptops
Hardware locksother locks such as locked doors securing a wiring closet or a server room / locked cabinet doors
Compensating Controlsalternative controls used instead of a primary control e.g. Time based One-Time Password (TOTP)
Virtualisationused within large data centers and can also be used on a regular personal computer (PC), allows to host one or more virtual systems / VMs on a single physical system e.g. a virtual network within a single physical system, this reduces cost
Virtualisation: Hypervisorthe software that creates, runs, and manages the VMs (VMware, Microsoft Hyper-V, Oracle VM all have hypervisor)
Virtualisation: Hostphysical system hosting the VMs is the host, cost more for RAM, processor, hard drive space, one or more fast network cards but requires less electricity, less cooling and less physical space
Virtualisation: Guestoperating systems running on the host system are guests or guest machines
Virtualisation: host elasticity and scalabilityreferse to the ability ro resize computing capacity based based on the load e.g. VM increased traffic, where you can then increase the processing power and memory used by the server
ROIgood return of investment e.g. nine servers with 20% processing power memory and disk space, you can instead convert three physical servers to virtual hosts and run three guests + easier maintain less physical servers (electricity, HVAC)
Security awareness and trainingensuring that users are aware of security vulnerabilities and threats helps prevent incidents e.g. less likely to be tricked when users understand how social engineers operate
Comparing HypervisorsType I Hypervisors vs Type II Hypervisors
Hypervisors: Type Irun directly on the system hardware, bare metal hypervisors because no need to be in an OS e.g. VMware has a family of ESX/ESXi products that are Type I
Hypervisors: Type IIrun as software within a host operating system e.g. Microsoft Hyper-V runs within a Microsoft OS
When to use each type of Hypervisoron a pc, you use type II hypervisor-based virtualisation, virtualisation in large-scale data centers use type I typically
Application cell virtualisationhas no kernel, runs services or applications within isolated application cells (or containers) e.g. container has one isolated service or app running on host operating system kernel)
Benefit of container virtualisationit uses fewer resources and can be more efficient than a system using a traditional Type II hypervisor virtualisation, ISP often use it for customers who need specific applications, drawback: containers must use OS of the host, e.g. host is running linux all containers must run linux
Security Network Architecturepossible to use virtualisation as part of an overall secure network architecture, VMs can provide segregation, segmentation and isolation of individual systems e.g. disabling the NIC in the VM prevents transmitting data
Snapshotsprovides you with a copy of the VM at a moment in time, which you can use as a backup e.g. best to take snapshot of system before performing a risky operation like patches, updates, testing security controls, and installing new apps (can revert or roll back to this)
VDI/VDE and non-persistencevirtual desktop infrastructure (VDI) / virtual desktop environment (VDE), user's desktop operating system runs a VM on a server
Benefits of VDI/VDEuser PCs can have limited hardware resources, if the PC can connect to a server over a network it can run a full featured desktop OS
Consider these when using virtual desktopsif they support persistence or non-persistence
Persistent Virtual Desktopeach user has a custom desktop image, users can customise them and save their data within desktop, drawback: amount of disk space required on the server to support unique desktop images for all users
Non persistent Virtual Desktopserve the same desktop for all users, when user acces the remote server, it provides a desktop oOS from preconfigured snapshot, although users can make changes to the desktop as they're using it, it reverts to a known state when they log off
Security awareness and trainingensuring that users are aware of security vulnerabilities and threats helps prevent incidents e.g. less likely to be tricked when users understand how social engineers operate
VMs as Filesthey're just files so it's easy to manage
VM Escapeis an attack that allows an attacker to access the host system from within the virtual system, can hack the hypervisor so keep physical and virtual servers patched
VM Sprawloccurs when organisation has many VMs that aren't managed properly e.g. Bart uses a VM to test a software and leaves it running, SysAd patches all known VMs, Bart didn't tell anyone so now it's unpatched and a vulnerability
VM: Confidentialityimportant to protect VMs cos they're just files, easy to hack by a disgruntled admin
Kali Linuxa free linux distribution used by many security professionals for penetration testing and security auditing
VM choicesHyper-V, VMware Workstation Player, Oracle VMVirtualBox
Help Switch on CMDping /? or ping-?, ipconfig /? or ipconfig -?, netstat /? or netstat -?
Help on Terminalping, ping | help (:these two returns an error but doesn't provide the same amount of help), ping -help, man ping
CMD vs TerminalCMD is not case sensitive
Pingto test connectivity for remote systems e.g. verify can resolve valid host named to IP address, test the NIC, and check security posture of network
Ping's Protocolsends Internet Control Message Protocol (ICMP) echo request packets, remote system is operational when you receive echo replies e.g. ping 192.168.1.1 verifies computer can connect to another computer in the network
Ping replieson windows it replies 4x while on linux it just continues until you press ctrl + c, but you can mimic this on windows with ping -t 192.168.1.1, on linux can mimic windows with ping - c 192.168.1.1
Ping to check name resolutioncomputer queries a Domain Name System (DNS) with the host name, and DNS respond with an IP address e.g. malware can change the name resolution process to prevent systems from reaching the Windows Update server for updates, you can ping it to verify it works
What if Ping fails?can't just assume that it's not operational or unreachable cos many denial of service (DoS) attacks use ICMP to disrupt services on internet based systems and firewalls commonly block ICMP traffic e.g. you can connect to slytherinfakesite.com using a browser, but ping might fail so thie means it operates on HTTP but firewall blocks ICMP
Main uses of pingVerify name resolution process, security posture, networks through verifying routers, firewalls, and IPSs block ICMP traffic when configured
ipconfigshows the Transmission Control Protocol (TCP/IP) configuration information for a system e.g. IP address, subnet mask, default gateway, MAC address, address of DNS server, Config info on NIC, wired/wireless NIC
ifconfiginterface configuration, more capable than ipconfig cos you can configure the NIC
Common commands: ipconfig /allshows comprehensive listing of TCP/IP config info for each NIC, MAC, DNS server, DHCP server address if it's a client / ifconfig -a on linux
Common commands: ipconfig /displaydnseach time a system queries DNS to resolve a host name to an IP address, it stores the result in the DNS cache, hostname to IP address mappings included
Common commands: ipconfig /flushdnsyou can erase the contents of the DNS cache with this command, used when cache has incorrect information and you want to ensure DNS is queried for up to date information
Linux Common commands: ipfconfig eth0shows the config of the first NIC to change settings / wlan0 for first wireless interface
Linux Common commands: ifconfig eth0 promiscenabled promiscuous mode on the first ethernet interface, allows NIC to process all traffic it receives / default is all packets not addressed to it, just few addressed to it
Linux Common commands: ifconfig eth0 allmulticommand enables multicast mode on the NIC, allows process all multicast traffic received by the NIC usually only process traffic for multicast groups it joined, turn it off with 'ifconfig eth0 -allmulti'
Linux: use ip instead of ifconfiglinux debian developers don't maintain the package anymore but still available sometimes e.g. ip link show (shows the interfaces along with some details on them), ip link set eth0up (enables a network interface), ip -s link (shows statistics on the network interfaces)
netstatnetwork statistics, allows you to view statistics for TCP/IP protocols on a system, also gives the ability to view active TCP/IP network connections. Many attacks establish connections from an infected computer to a remote one. Use this if you suspect it
Common commands: netstat -adisplays a listing of all TCP and User Datagram Protocol (UDP) ports that a system is listening on, in addition to all open connections e.g. IP address followed by :80 means it's listening on the default port of 80 for HTTP, a web server
Other common commands for netstatnetstat -r (displays the routing table), netstat -e (displays details on network stats, including bytes sent and received), netstat -s (displays stats of packets sent or received for specific protocols such as IP, ICMP, TCP, and UDP), netstat -n (displays addresses and port numbers in numerical order), netstat -p protocol (shows stats on a specific protocol like TCP / UDP e.g. netstat -p tcp / netstat -anp tcp to define states).. Established means normal, Listen means waiting, CLOSE_WAIT waiting for termination, TIME_WAIT, SYN_SENT, SYN_RECEIVED etc.
Tracertlists the routers between two systems, each router is a hop. Tracert identifies the IP address and sometimes the host name of each hop in addition to round-trip times (RTTs) for each hop, linux use traceroute. Use this for faulty routers. shows where the traffic stops. Useful for Wide Area Networks (WAN)!
Security use: Tracertcould discover an unauthorised router between router 1 and the internet
Tracing a path with tracertAttacker could capture the traffic with a protocol analyser and view data sent in cleartext, attacker may also launch other attacks e.g. connection is slow, could use tracert to verify path and you can find out that IP Address is in foreign countries (tracert -d site forces tracert to not resolve ip to host name so its faster
Arpaddress resolution protocol/command, resolves ip address to MAC addresses and stores the result in the ARP cache (arp shows help, arp -a shows ARP cache, arp-a 192.168.1.1 displays ARP cache entry for the specified IP address | for linux: arp shows ARP cache)
When to use Ping, Netstat, Tracert, Ipconfig and ARPthe gist is that Ping for a reply to test connection, Netstat to see the connections (infected to another computer), Tracert to see where traffic stops (hop/router), Ipconfig to view config of network interfaces and ARP to identify MAC address when you have the IP (arp -a ip or leave it without ip) arp can be useful for ARP cache poisoning attacks

BLUE TEAM

Threatthis refers to a new or newly discovered incident that has the potential to harm a system or your company overall. e.g. Natural, Unintentional, or Intentional
Vulnerabilityrefers to a known weakness of an asset (resource) that can be exploited by one or more attackers e.g. How are you protecting your data?
Riskdefined as the potential loss or damage when a threat exploits a vulnerability e.g. Damage a reputation, Financial Losses
Proprietary Standard"owns exlusive rights to something e.g. Facetime is a proprietary standard that cannot be installed on other OS legally."
Top-down Policies and Protocolsrefers to cybersecurity mandatory practices to have adequate security
Triagea method that helps you respond faster and with more accuracy to security events
3 Step TriageIdentify, Map and Eradicate
Identifyto identify compromised, or infected end points
Mapto find how they got in, where they went, and what they're trying to retrieve
Eradicateto eradicate any malicious contents so the attacker no longer poses a threat
What does a security solution include?IPS/IDS, WAF, SIEM all generate security alerts
It's important to combine these for defenseAI, Human and Threat Intelligence is needed
IPS/IDSIntrusion Prevention/Detection System
WAFWeb Application Firewall
TLPTraffic Light Protocol, a set of designations to ensure that sensitive information is shared to the right audience
Data Exfiltration / Data Extrusionthe unauthorised transfer of data from a computer
ICMPInternet Control Message Protocol
ANY.RUNMalware Analysis Software
NISTNational Institute of Standards and Technology
NZISMNew Zealand Information Security Manual, the government's manual for information assurance, and information security systems
Artifactdata that may or may not be relevant to the response / investigation e.g. Registry Keys, Time Stamp, Event Logs
FTPSFile Transfer Protocol that uses TLS/SSL protocol for encryption e.g. FileZilla and WinSCP
TCP vs UDPTransmission Control Protocol prioritises quality of connection, while User Datagram Protocol focuses on speed
Core Functions Sample (SACTAPC)Security Operations Centre (action for smaller stuff), Advisory and Strategy, CSIRT Team (for incidents!), Security Testing (Pentesting), Security Awareness, Programme of Work(how we're doing), Collaboration (research teams like CROW and WAND)
Incident Red Book Sample (ACER)Assessment, Containment, Eradication, and Recovery
C&C (Command and Control) Servercomputer controlled by an attacker or cybercriminal used to send commands to systems compromised by malware and receive stolen data e.g. Blocking C&C IPs at the firewall
Triagesorting threats by importance or priority
Threat Intelligenceinformation that organisations can use to combat cyber threats
Common Vulnerability Score System / CVSSa free and open industry standard for assessing the severity of computer system security vulnerabilities.
Security through obscurity / STOis based primarily on hiding important information and enforcing secrecy as the main security technique. e.g. Hiding passwords on binary, renaming folders, hiding software versions
Deep Packet Inspection (DPI)involves the use of network equipment to intercept, examine, modify, restrict, or copy the content of data communications on the fly.


UNDERSTANDING IDENTITY AND ACCESS MANAGEMENT

Identificationoccurs when users claim (or profess) their identity with identifiers such as usernames or email addresses
Authenticationusers prove their identity with this, such as with a password
User's credentialrefers to both claimed identity and an authentication mechanism
AAAauthentication, authorisation, and accounting
Authorisationusers are granted this to access resources based on their proven identity
Accountingthis method track user activity, and record the activity in logs
Audit Logstrack activity and administrators use these to create an audit trail
Audit Trailallows security professionals to re-create the events that preceded a security incident
'Something you know' Authentication Factortypically refers to a shared secret, such as a password or even a PIN. This factor is the least secure form of authentication. However, you can increase the security through guidelines.
Password Complexitycomplex passwords doesn't necessarily mean strong. Recommendations for the best length vary depending on the type of account.In 2016, Microsoft began recommending a best practice of setting the length to at least 14 characters.
Key Point on Longer Passwordslonger passwords using more character types are more secure and short passwords of 4 or 5 characters are extremely weak.
Formulas on passwords26^6 for lower case letters 6 character passwords / 10 of the same will be 26^10 because of 26 letters. Password cracking tools can crack 20 billion per second on high0end graphics processor. 10 character password can be cracked in 2 hours. But if you use 94 printable characters, it's 94^10 at the quintillions. Takes years to crack 4 different character types
MillionsBillions, Trillions, Quadrillion, Quintillion                                                                                  


Comments

Popular Posts