2. What is password
A secret series of characters that enables a user
to access a file, computer, or program.
On multi-user systems, each user must enter his
or her password before the computer will respond
to commands
3. Why passwords are important
To guarantee security to personal information
To prevent unauthorized access to user
accounts
To prevent unauthorized access to important
information
To be able to use various Internet services
securely
4. Internal password theft is easy
Can be heard while giving it out to someone
you trust.
Someone looking over your shoulder can
discover it.
When kept in a desk drawer, on a monitor or
under a keyboard.
Social Engineering.
5. Secure your password
Your password is only yours. Do NOT:
Never tell any one your Say your password aloud.
password, including E-mail your password to a
supervisors, personal co-worker.
assistants, or IT personnel.
Offer anyone hints
Change your password often about what your password
Never write down your might be.
password.
6. Create a strong password
A strong password guarantees maximum protection
Length. Make your passwords long with eight or
more characters.
Complexity. Use the entire keyboard.
Variety. Don't use the same password for
everything.
Variation: Change them often.
7. Weak password
Sequences or repeated characters. Examples:
12345678, 222222, abcdefg, or adjacent letters on your
keyboard.
Words spelled backwards, common misspellings, and
abbreviations.
Personal information. Your name, birthday, driver's
license, passport number, or similar information.
Dictionary words in any language.
8. Examples of bad passwords
Sports teams or terms: FootballcluB
Number sequence: *12345*
Letter string: BBBBBB
Mixed-case sequence: ABcdEFgh
Company name: NkemIT
Keyboard sequence: AsdfG or QwErty
10. Conclusion
A strong password can protect your personal account.
A password is the key to your organization’s resources.
Try and develop a strong passwords that are not obvious to
someone familiar with you.
Remember to change your password on a regular basis.
11. References
Gollmann, D. (2011). Identification and Authentication. In:
Computer Security. 3rd ed. West Sussex: John Wiley & Sons Ltd.
p39-64
IT Services. (2011) Password. Wolverhampton: University of
Wolverhampton IT Service.
Microsoft. (2012). Create strong passwords. Available:
http://www.microsoft.com/security/online-privacy/passwords-
create.aspx. Last accessed 20th May 2012.
Pptuu. (2012). Protecting Your Password (1). Available:
http://www.pptuu.com/show_498555_1.html. Last accessed 20th
May 2012.
12. References (cont’d)
UT H. (2010). Information Security Frequently Asked Questions
(FAQs). Available:
http://ims.uthscsa.edu/information_security/information_faq.aspx.
Last accessed 20th May 2012.
Webopedia. (2012). password. Available:
http://www.webopedia.com/TERM/P/password.html. Last accessed
20th May 2012.
Wolverhampton, Uni. (2012). IT Security. Available:
http://www.wlv.ac.uk/its/ default.aspx? page=6990. Last
accessed 20th May 2012.
13. ASK YOURSELF
How secure is my
password?
http://howsecureismypassword.net/
https://www.microsoft.com/security/pc-security/password-
checker.aspx