Types of Attacks:

Hashing:

An algorithm is used to generate a number called a hash, from a text string

A password is considered weak if it meets one of the following conditions:

– The password is less than eight characters long

– The password consists of only one type of characters, such as only letters

– The password is a common word or phrase

– The password contains repeated characters or simple sequences

– The password contains common character substitutions

The Frequently required policies section is divided into four parts

Other policies