What is password A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands
Why passwords are important To guarantee security to personal information To prevent unauthorized access to user accounts To prevent unauthorized access to important information To be able to use various Internet services securely
Internal password theft is easy Can be heard while giving it out to someone you trust. Someone looking over your shoulder can discover it. When kept in a desk drawer, on a monitor or under a keyboard. Social Engineering.
Secure your password Your password is only yours. Do NOT: Never tell any one your Say your password aloud. password, including E-mail your password to a supervisors, personal co-worker. assistants, or IT personnel. Offer anyone hints Change your password often about what your password Never write down your might be. password.
Create a strong password A strong password guarantees maximum protection Length. Make your passwords long with eight or more characters. Complexity. Use the entire keyboard. Variety. Dont use the same password for everything. Variation: Change them often.
Weak password Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard. Words spelled backwards, common misspellings, and abbreviations. Personal information. Your name, birthday, drivers license, passport number, or similar information. Dictionary words in any language.
Examples of bad passwords Sports teams or terms: FootballcluB Number sequence: *12345* Letter string: BBBBBB Mixed-case sequence: ABcdEFgh Company name: NkemIT Keyboard sequence: AsdfG or QwErty
ConclusionA strong password can protect your personal account.A password is the key to your organization’s resources.Try and develop a strong passwords that are not obvious tosomeone familiar with you.Remember to change your password on a regular basis.
ReferencesGollmann, D. (2011). Identification and Authentication. In:Computer Security. 3rd ed. West Sussex: John Wiley & Sons Ltd.p39-64IT Services. (2011) Password. Wolverhampton: University ofWolverhampton IT Service. Microsoft. (2012). Create strong passwords. Available:http://www.microsoft.com/security/online-privacy/passwords-create.aspx. Last accessed 20th May 2012.Pptuu. (2012). Protecting Your Password (1). Available:http://www.pptuu.com/show_498555_1.html. Last accessed 20thMay 2012.
References (cont’d) UT H. (2010). Information Security Frequently Asked Questions(FAQs). Available:http://ims.uthscsa.edu/information_security/information_faq.aspx.Last accessed 20th May 2012.Webopedia. (2012). password. Available:http://www.webopedia.com/TERM/P/password.html. Last accessed20th May 2012.Wolverhampton, Uni. (2012). IT Security. Available:http://www.wlv.ac.uk/its/ default.aspx? page=6990. Lastaccessed 20th May 2012.
ASK YOURSELF How secure is my password? http://howsecureismypassword.net/https://www.microsoft.com/security/pc-security/password- checker.aspx