Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
Password File Access ControlOne way to thwart a password attack is to deny the opponent access to the passwordfile. If the hashed password portion of the file is accessible only by a privileged user,then the opponent cannot read it without already knowing the password of a privilegeduser. Often, the hashed passwords are kept in a separate file from the userIDs, referred to as a shadow password file . Special attention is paid to making theshadow password file protected from unauthorized access. Although password fileprotection is certainly worthwhile, there remain vulnerabilities:• Many systems, including most UNIX systems, are susceptible to unanticipatedbreak-ins. A hacker may be able to exploit a software vulnerability in theoperating system to bypass the access control system long enough to extractthe password file. Alternatively, the hacker may find a weakness in the filesystem or database management system that allows access to the file.• An accident of protection might render the password file readable, thus compromisingall the accounts.• Some of the users have accounts on other machines in other protectiondomains, and they use the same password. Thus, if the passwords couldbe read by anyone on one machine, a machine in another location might becompromised.• A lack of or weakness in physical security may provide opportunities for ahacker. Sometimes there is a backup to the password file on an emergencyrepair disk or archival disk. Access to this backup enables the attacker to readthe password file. Alternatively, a user may boot from a disk running anotheroperating system such as Linux and access the file from this OS.• Instead of capturing the system password file, another approach to collectinguser IDs and passwords is through sniffing network traffic.
Sedang diterjemahkan, harap tunggu..