home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page104.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  124KB  |  817x1045  |  8-bit (256 colors)
Labels: book | daily | hakham | reckoner | sky
OCR: SECTION CHAPTER For example, ATMs require bank card (something you possess and PIN (something you know) In contrast, passwords are associated with sin- gle- factor authentication used for networks, Web sites, and other situations in which the hardware for dealing with ID cards is not available. PASSWORD HACKS How serious password theft? To a hacker, obtaining the password TERMINO OGY NOTE for specific user IC can be even more rewarding than burglar figuring out the combination 0 house safe Once hackers get into user account Hacker can refer wealth of personal information can be at their fingertips. This information skilled programmer or could be anything from juicy e-mail gossip to Social Security numbers per son who manipulates credit card numbers, bank account numbers, health data, and o ...