Skip to content

Why use passwords?

 

Strong vs weak

 

 

Limitations

 

Social engineering

Rainbow tables / hash tables

Salting & Hashing

Hashing

Salting

 

 

2FA

Two Factor Authentication

 

 

Alternatives

Physical Tokens

Biometrics