AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Personally identifiable information (e.g., your dog's name, date of birth, area code, favorite video game).Insecure passwords include those containing: In cryptography the quality of a password is often referred to as its entropy. The tenets of strong passwords are based on length and randomness. personal information, or cracked using methods like social engineering or brute-force attacks. Passwords must be complex enough to not be easily guessed from e.g. They are the main way a computer chooses to trust the person using it, so a big part of security is just about picking secure passwords and protecting them. They secure your user accounts, encrypted filesystems, and SSH/ GPG keys. Create a plan ahead of time to follow when your security is broken. You can never make a system 100% secure unless you unplug the machine from all networks, turn it off, lock it in a safe, smother it in concrete and never use it.If anything sounds too good to be true, it probably is! When one layer is breached, another should stop the attack. Defense in depth: Security works better in independent layers.The principle of least privilege: Each part of a system should only be able to access what is strictly required, and nothing more.The biggest threat is, and will always be, the user.The trick is to create a secure and useful system. Security and convenience must be balanced. It is possible to tighten security to the point where the system is unusable.This article contains recommendations and best practices for hardening an Arch Linux system.
0 Comments
Read More
Leave a Reply. |