2. Password
On computer systems where multiple users share disk
space and system resources, each user is given a
computer account.
How does the system know who is authorized to access
and use this account?
The user enters a password. If the user enters the
correct password, access is granted.
When you first get your account, some computer
systems assign a password to you and you can't
change it, but on the vast majority of systems, including
the UNIX workstations in, it is up to the user to select a
password for his or her account.
Selecting a strong password is the single most
important thing you can do to protect your information
from unauthorized access.
3. Need of Strong Password
if your computer system is connected
to the internet, and almost all are
today, anyone in the world who can
connect to the internet can attempt to
access your account by guessing your
password.
All that is needed is your account
name or id, and this information isn't
difficult to obtain on many computer
systems.
4. How to choose a strong
password
uSE BoTh UppEr and loWEr Case
Characters, digits, punctuation, and
!@#$%^&* characters (and not just as the
last character of you password only) if your
computer system allows it. The more
complex and random the password is, the
harder it is to crack.
5. How to choose a strong
password
You should try to choose a password that
uses the maximum number of characters
allowed. On UNIX systems, the maximum
password length is 8 characters. As a
minimum your password should be 6
characters.
Change your password regularly
Beware of people hanging over your
shoulder when you type your pas
Don't use a word in the English dictionary or
a minor variation on that word.sword.
6. How to choose a strong
password
Never tell your password to anyone.
Never write your password down.
Don't use simple patterns of adjacent
letters on the keyboard.(zxcvb etc.)
7. Shoulder Surfing
Shoulder surfing refers to a direct observation,
such as looking over a person's shoulder, to
obtain information.
In some cases shoulder surfing is done for no
reason other than to get an answer, but in other
instances it may constitute a security breach as
the the person behind may be gleaning private
information such as your PIN at a bank machine,
or Credit card information as you enter it into
a Web based shopping cart check-out. While
shoulder surfing is most common in busy and
crowed areas where the perpetrator is not as
likely to be caught, shoulder surfing can also be
done with the aid of cameras from a more remote
location.
9. Shoulder Surf-Prevention
it is advised to shield paperwork or the
keypad from view by using one’s body
or cupping one’s hand.
When working on a laptop, ensure that
your back is to a wall with no open
sides close to you or to enter your
passwords in a secluded location.
10. Piggybacking
Piggybacking, in a wireless
communications context, is the
unauthorized access of a wireless
LAN.
The usual purpose of piggybacking is
simply to gain free network access
rather than any malicious intent, but it
can slow down data transfer for
legitimate users of the network.
11. Piggybacking
It's quite simple to access an unsecured
wireless network: All you have to do is
get into the range of a Wi-
Fi hotspot's signal and select your
chosen network from the options
presented.
However, unauthorized network access,
even to free Wi-Fi, may be illegal. People
have been fined for accessing hot spots
from outside businesses, such as coffee
shops, that provide free Wi-Fi for
12. Piggybacking -Prevention
To protect your network from
piggybacking, ensure that encryption is
enabled for yourrouter.
Use Wireless Encryption Protocol (WEP)
if that's your only option, but if possible
use Wireless Protected Access (WPA) or
WPA2.
Use a strong password for your
encryption key, consisting of at least 14
characters and mixing letters and
numbers.