Preview

Creating a Stronger Password

Good Essays
Open Document
Open Document
639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Creating a Stronger Password
Tips for creating strong passwords and passphrases
A password is a string of characters used to access information or a computer. Passphrases are typically longer than passwords, for added security, and contain multiple words that create a phrase. Passwords and passphrases help prevent unauthorized people from accessing files, programs, and other resources. When you create a password or passphrase, you should make it strong, which means it's difficult to guess or crack. It's a good idea to use strong passwords on all user accounts on your computer. If you're using a workplace network, your network administrator might require you to use a strong password.
Note
· In wireless networking, a Wi-Fi Protected Access (WPA) security key supports the use of a passphrase. This passphrase is converted into a key that is used for encryption, which is not visible to you. For more information about WPA security keys, see What are the different wireless network security methods?[->0]
What makes a password or passphrase strong?
A strong password: |A strong passphrase: |
· Is at least eight characters long.· Does not contain your user name, real name, or company name.· Does not contain a complete word.· Is significantly different from previous passwords.|· Is 20 to 30 characters long.· Is a series of words that create a phrase.· Does not contain common phrases found in literature or music.· Does not contain words found in the dictionary.· Does not contain your user name, real name, or company name.· Is significantly different from previous passwords or passphrases.|

Strong passwords and passphrases contain characters from each of the following four categories:
Character category|Examples|
Uppercase letters|A, B, C|
Lowercase letters|a, b, c|
Numbers|0, 1, 2, 3, 4, 5, 6, 7, 8, 9 |
Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces|` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /|
A password or

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    War Driving

    • 1481 Words
    • 6 Pages

    With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Wi-Fi Security

    • 1913 Words
    • 8 Pages

    Wi-Fi is cryptographic based methods for enabling the security. Wired Equivalent Privacy as well as Wi-Fi Protected Access security techniques give us security (Rowan, 2010). Privacy: the data that has been transmitted within a network must not be readable to anybody however those communicating. Authentication: Only clients who are aware about shared secret can connect to network. Wi-Fi Protected Access had been initial cryptographic protocol which has been made for the Wi-Fi for enabling the privacy as well as authentication. But Wi-Fi Protected Access had not been fully secure. For rectifying the security issues with Wi-Fi Protected, Wi-Fi Alliance has introduced cryptographic protocol i.e. Wi-Fi Protected Access. From that time the general practice about securing the Wi-Fi Protected Access enabled network with the passwords was discovered of being vulnerable towards the offline dictionary attack. Even if Wi-Fi Protected Access has been thought to be very secure rather than from the dictionary attack, this had been the quick fix to problems in…

    • 1913 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Wireless networking has been an issue of security since its creation. With early technology it was simple to steal someone’s data or connect into their LAN. Some advances were made, such as encryption and the need for MAC (media access control) addresses on the access point, but it was still relatively simple to bypass these security methods. New solutions in wireless networking security such as CCE, WPA, and AES are helping to destroy misconceptions and improve security. The first real standard for wireless security was WEP (Wired Equivalent Protection). It did not live up to its name. WEP offered only basic security. There are free utilities available online which can be used to find wireless networks and attempt to gain access, such as AirSnort. Its simplicity to crack comes from the use of a static 40 bit encryption key. This key had to be entered manually on…

    • 607 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Although Springer, as a publisher of STM content, makes use of a wide range of Unicode characters, this content does not require the use of the entire range of possible Unicode characters (96,382 in Unicode 4.0). As a result we have determined the subset of characters that we support. This subset goes far beyond the characters belonging to the standardized ISO entity sets familiar from SGML. The standard Unicode set itself does not contain all the characters that we require.…

    • 10693 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Password Strength

    • 5555 Words
    • 23 Pages

    A password is a secret word or string of characters that is used for user authentication to prove identity, or for access approval to gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging in to accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online.…

    • 5555 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Android Wifi Apps

    • 833 Words
    • 4 Pages

    The most of the times you scan the Wi-Fi networks available around, they’re protected with key. Penetrate is an app that help you out with that. If the routers of that Wi-Fi networks are encrypted with WEP/WPA it will bring you the keys to access them. This seems a sort of cracking, but the developers says it…

    • 833 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Password protection is highly important when talking about Information security systems. Passwords are the first step in keeping out hackers and unwanted guests from entering your security systems. All organizations will require passwords to enter their security systems. Also when dealing with passwords they will also require you to have different symbols. Things such as one capital letter or a total of three numbers in the password or even adding a special character may be a requirement when making a password for the security system.…

    • 1131 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Ip Camera Fixing

    • 497 Words
    • 2 Pages

    3)set WIFI security, security mode is “WPA Personal”, wpa Algorithms is “AES”, Wpa Share key is “ 123456abcd”, Group key renewal is “3600”.…

    • 497 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This paper begins by introducing the concept of WLAN. The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats, this paper will look at Denial of Service, Spoofing, and Eavesdropping. The paper will then explain how Wired Equivalent Privacy (WEP) works, which is the IEEE 802.11b/WiFi standard encryption for wireless networking. The discussion of WEP continues by examining its weaknesses, which result in it being much less secured than what was originally intended. This situation leads to further research regarding practical solutions in implementing a more secured WLAN. This paper will also cover the new standards to improve the security of WLAN such as the IEEE 802.1x standard, which comprises of three separated sections: Point-to-Point Protocol (PPP), Extensible Authentication Protocol (EAP) and 802.1x itself. The 802.1x is actually included in 802.11i, a newly proposed standard for key distribution and encryption that will play a big role in improving the overall security capabilities of current and future WLAN networks. The 802.11i standard provides two improved encryption algorithms to replace WEP, which are Temporal Key Integrity Protocol (TKIP) and CBC-MAC Protocol (CCMP). This paper will also list down several products that will assist users to protect their wireless networks from attacks. Finally, this paper ends with the conclusion of highlighted issues and solutions.…

    • 5329 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Arroba

    • 4129 Words
    • 17 Pages

    "@" and ":@" redirect here. For emoticon, see List of emoticons. For the letter A within a circle, see Enclosed A.…

    • 4129 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Public Key Encryption

    • 330 Words
    • 2 Pages

    - A symbol representing a lock may appear in a locked position somewhere on your browser (often in the bottom right corner).…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Password Security

    • 262 Words
    • 3 Pages

    Use at least one of these special characters: ! @ # $ % * ( ) - + = , < >…

    • 262 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Teco Company

    • 467 Words
    • 2 Pages

    , . . . . - . - -. ~,,","_ '~=' r ' - ..…

    • 467 Words
    • 2 Pages
    Satisfactory Essays