From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Authentication and session management issues

Authentication and session management issues

- [Narrator] Software developers rely upon authentication systems to validate the identities of users and make authorization decisions. We've already talked about a few application authentication concepts, but let's take a look at a couple of issues of specific importance to software developers. First, you should never store user passwords in plain text form. Storing passwords exposes them to the risk of theft. Instead, you should store passwords in hashed and salted form. Hashing a password uses a cryptographic algorithm to transform the password into a value that can't be reversed. This allows for the verification that a password is correct by comparing hash values, but it doesn't allow someone with a hash file to recover the passwords because the hash function is irreversible. Salting the passwords prior to hashing them adds a random value to the password. This is a control that's necessary to protect against a specific type of attack called a rainbow table attack, where the…

Contents