Skip main navigation

Hashing and Rainbow Tables

In this video, you will learn about one of the first ways IdAM practitioners operated the client server architecture.

In this video, you will learn about one of the first ways IdAM practitioners operated the client server architecture, about its vulnerabilities, and how it was addressed.

What was the process?

Identity and access management was achieved through server passwords. Specifically, a user would create a password on the server, which would store the master template of the password. When the user logged in, the password was sent to the server to be compared against the master template. If it matched, access was granted. However, there are two major problems with this: the server has a copy of everyone’s password and a password will traverse the network.

Watch the video to find out how this was addressed and the subsequent vulnerabilities that manifested.

Reflect and share: Have you experienced password hacking? How did you, or would you, handle it? Share with your fellow learners.

This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now