Ready to Start Your Career?

By: Prashant Kumar Dey
July 28, 2016
Prashant's Algorithm for Password Management
By: Prashant Kumar Dey
July 28, 2016

By: Prashant Kumar Dey
July 28, 2016
Prashant's Algorithm for Password Management
IntroductionWe've seen many forms of Social Engineering Attacks (SEA). The main aim of these SEA are to exploit the human vulnerability. The biggest vulnerability in Cyber Security is the human.Consider the following:- There's significant increase in websites and, without thinking, many people make accounts on them.
- Problems arise when we see a warning message like "Choose an unique Password" yet we keep same password for each and every site.
- This is something we can't ignore.
- We can't remember hundreds and thousands of password for hundreds and thousands of site.
- Herein lies vulnerability.
ROT 1 | ROT 2 | ROT 4 | ROT 6 | |
Plain Text | PRASHANT | PRASHANT | PRASHANT | PRASHANT |
Caesar Cipher | QSBTIBOU | RTCUJCPV | TVEWLERX | VXGYNGTZ |
Main Password Combination | Sites we are visiting | Final password combination |
Prashant$4007 | Prgasfhapntb$4c00l7 | |
Prashant$4007 | Gmail | Prhasjhanntm$4b00h7 |
Prashant$4007 | Pruasuhasntj$4f00x7 |
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry