SlideShare una empresa de Scribd logo
1 de 15
Splendorcollege
What is password
 A secret series of characters that enables a user

 to access a file, computer, or program.



 On multi-user systems, each user must enter his

 or her password before the computer will respond

 to commands
Why passwords are important
     To guarantee security to personal information

     To prevent unauthorized access to user
     accounts

     To prevent unauthorized access to important
     information

     To be able to use various Internet services
     securely
Internal password theft is easy
          Can be heard while giving it out to someone

           you trust.

          Someone looking over your shoulder can
           discover it.

          When kept in a desk drawer, on a monitor or

           under a keyboard.

          Social Engineering.
Secure your password
 Your password is only yours.   Do NOT:
 Never tell any one your         Say your password aloud.
  password, including             E-mail your password to a
  supervisors, personal            co-worker.
  assistants, or IT personnel.
                                  Offer anyone hints
 Change your password often       about what your password
 Never write down your            might be.
  password.
Create a strong password
   A strong password guarantees maximum protection

    Length. Make your passwords long with eight or

   more characters.

    Complexity. Use the entire keyboard.

    Variety.   Don't   use   the   same    password   for

    everything.

    Variation: Change them often.
Weak password
 Sequences or repeated     characters. Examples:
  12345678, 222222, abcdefg, or adjacent letters on your
  keyboard.

 Words spelled backwards, common misspellings, and
  abbreviations.

 Personal information. Your name, birthday, driver's
  license, passport number, or similar information.

 Dictionary words in any language.
Examples of bad passwords
 Sports teams or terms: FootballcluB

 Number sequence: *12345*

 Letter string: BBBBBB

 Mixed-case sequence: ABcdEFgh

 Company name: NkemIT

 Keyboard sequence: AsdfG or QwErty
Better passwords
Original password:    New password:
• FootballCluB        • F*7o12S6Lua

• NkemIT              • nK&5i8

• WaRty               • Y9#RW^a

• EArThing            • 970RTg8%

• 2RepublicTech8      • T3CH&R3pU7Lic
Conclusion

A strong password can protect your personal account.

A password is the key to your organization’s resources.

Try and develop a strong passwords that are not obvious to

someone familiar with you.

Remember to change your password on a regular basis.
References
Gollmann, D. (2011). Identification and Authentication. In:
Computer Security. 3rd ed. West Sussex: John Wiley & Sons Ltd.
p39-64

IT Services. (2011) Password. Wolverhampton: University of
Wolverhampton IT Service.

 Microsoft. (2012). Create strong passwords. Available:
http://www.microsoft.com/security/online-privacy/passwords-
create.aspx. Last accessed 20th May 2012.

Pptuu. (2012). Protecting Your Password (1). Available:
http://www.pptuu.com/show_498555_1.html. Last accessed 20th
May 2012.
References (cont’d)
 UT H. (2010). Information Security Frequently Asked Questions
(FAQs). Available:
http://ims.uthscsa.edu/information_security/information_faq.aspx.
Last accessed 20th May 2012.

Webopedia. (2012). password. Available:
http://www.webopedia.com/TERM/P/password.html. Last accessed
20th May 2012.

Wolverhampton, Uni. (2012). IT Security. Available:
http://www.wlv.ac.uk/its/ default.aspx? page=6990. Last
accessed 20th May 2012.
ASK YOURSELF

         How secure is my
           password?
          http://howsecureismypassword.net/

https://www.microsoft.com/security/pc-security/password-
                      checker.aspx
End
Questions

Más contenido relacionado

La actualidad más candente

Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Password Management
Password ManagementPassword Management
Password ManagementRick Chin
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 

La actualidad más candente (20)

Digital signature
Digital  signatureDigital  signature
Digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Password Management
Password ManagementPassword Management
Password Management
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
User authentication
User authenticationUser authentication
User authentication
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Social engineering
Social engineering Social engineering
Social engineering
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 

Similar a Securing password

Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwordsBunmi Sowande
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurityricharddxd
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesPeter Wood
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Password Management
Password ManagementPassword Management
Password ManagementDavon Smart
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thsamirapdcosden
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 

Similar a Securing password (20)

Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security Vulnerabilities
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Password Management
Password ManagementPassword Management
Password Management
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
Network Security
Network SecurityNetwork Security
Network Security
 

Último

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Último (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Securing password

  • 2. What is password A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands
  • 3. Why passwords are important To guarantee security to personal information To prevent unauthorized access to user accounts To prevent unauthorized access to important information To be able to use various Internet services securely
  • 4. Internal password theft is easy  Can be heard while giving it out to someone you trust.  Someone looking over your shoulder can discover it.  When kept in a desk drawer, on a monitor or under a keyboard.  Social Engineering.
  • 5. Secure your password  Your password is only yours. Do NOT:  Never tell any one your  Say your password aloud. password, including  E-mail your password to a supervisors, personal co-worker. assistants, or IT personnel.  Offer anyone hints  Change your password often about what your password  Never write down your might be. password.
  • 6. Create a strong password A strong password guarantees maximum protection  Length. Make your passwords long with eight or more characters.  Complexity. Use the entire keyboard.  Variety. Don't use the same password for everything.  Variation: Change them often.
  • 7. Weak password  Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard.  Words spelled backwards, common misspellings, and abbreviations.  Personal information. Your name, birthday, driver's license, passport number, or similar information.  Dictionary words in any language.
  • 8. Examples of bad passwords  Sports teams or terms: FootballcluB  Number sequence: *12345*  Letter string: BBBBBB  Mixed-case sequence: ABcdEFgh  Company name: NkemIT  Keyboard sequence: AsdfG or QwErty
  • 9. Better passwords Original password: New password: • FootballCluB • F*7o12S6Lua • NkemIT • nK&5i8 • WaRty • Y9#RW^a • EArThing • 970RTg8% • 2RepublicTech8 • T3CH&R3pU7Lic
  • 10. Conclusion A strong password can protect your personal account. A password is the key to your organization’s resources. Try and develop a strong passwords that are not obvious to someone familiar with you. Remember to change your password on a regular basis.
  • 11. References Gollmann, D. (2011). Identification and Authentication. In: Computer Security. 3rd ed. West Sussex: John Wiley & Sons Ltd. p39-64 IT Services. (2011) Password. Wolverhampton: University of Wolverhampton IT Service. Microsoft. (2012). Create strong passwords. Available: http://www.microsoft.com/security/online-privacy/passwords- create.aspx. Last accessed 20th May 2012. Pptuu. (2012). Protecting Your Password (1). Available: http://www.pptuu.com/show_498555_1.html. Last accessed 20th May 2012.
  • 12. References (cont’d) UT H. (2010). Information Security Frequently Asked Questions (FAQs). Available: http://ims.uthscsa.edu/information_security/information_faq.aspx. Last accessed 20th May 2012. Webopedia. (2012). password. Available: http://www.webopedia.com/TERM/P/password.html. Last accessed 20th May 2012. Wolverhampton, Uni. (2012). IT Security. Available: http://www.wlv.ac.uk/its/ default.aspx? page=6990. Last accessed 20th May 2012.
  • 13. ASK YOURSELF How secure is my password? http://howsecureismypassword.net/ https://www.microsoft.com/security/pc-security/password- checker.aspx
  • 14. End