Using Certificates for
Authentication and Identification
•Crackers can run programs that create and enter passwords from a dictionary or a list of commonly used passwords.
•
•A brute force attack occurs when a cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system.
•
•User authentication is the process of associating a person and his identification with a very high level of assurance.