Preview

Nt1330 Unit 3 Assignment 1

Good Essays
Open Document
Open Document
599 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Assignment 1
1. Don’t share or divulge your passwords to anyone. It is risky. Evil minded people could gain access to your accounts with such passwords. Remember that you would be held responsible for anything done through your accounts.

2. Don’t allow any program remember your passwords. It is risky. Online criminals and hackers could steal such passwords. However, you can use a reputable password manager to recall passwords for you.

3. Don’t use only one password for all your online accounts. It is risky. Online criminals and hackers could potentially gain access to your accounts if they figure out such password. You should rather use distinct passwords for all your accounts.

4. Don’t recycle your passwords. It is risky. Online criminals and hackers who may have stolen such passwords in the past could regain access to your accounts.

5.
…show more content…
Don’t use words that exist in foreign dictionaries as passwords. It is risky. Online criminals and hackers could crack such passwords. However, you can use the first letter of each word in a long phrase to create strong passwords, provided you make some letters uppercase and swap out some letters with numbers and symbols.

6. Don’t use passwords that are less than eight characters. It is risky. Online criminals and hackers could guess or crack such passwords. However, you should remember that the longer your password, the harder it would be to guess or crack.

7. Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT321 Labs 1.1 - 1.7

    • 2018 Words
    • 38 Pages

    ! ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 enable password class ! ! !…

    • 2018 Words
    • 38 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Across Answer key (not in order) A password should be at least 8 characters long Login to this type of portal - secure Need special EHR software to ePrescribe A scanner is used to add older records A privacy-screen helps up with HIPAA server Data is stored off site here citrix The type of network we have A monitor is a visual display unit…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (Important: Copy and paste the password into the portal password field. If you get a “locked out” message, notify an ASR asap.)…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Bradley, T. (2014). Password policy: password must meet complexity requirements. In about.com. Retrieved March 15, 2014, from http://netsecurity.about.com/od/secureyourwindowspc/qt/complexpw.htm…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Better Essays

    There are multiple strategies followed for password policy implementation. Combination of password is one which has at least eight characters, should have upper and lower case letters, need to include alpha and numeric characters. The account administrator will assign a default password for first time. The user can save a new password for First time…

    • 1344 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Note: With this setting, you can view or erase the configuration, but you cannot change the password.…

    • 677 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    8. What is the PASS_MAX_DAYS setting? Why is it good to set this? Max days to change your password. This is a great idea to force people to change passwords and if they don’t then the account goes bye bye.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Kessler, G. C. (1996, January). Passwords - Strengths and Weaknesses. Retrieved November 20, 2012, from garykessler.net: http://www.garykessler.net/library/password.html…

    • 1348 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    * Common passwords containing name, birthdate, mobile number etc, that can be easily guessed by your friends, any known to you.…

    • 900 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    A password is a string of characters used to access information or a computer. Passphrases are typically longer than passwords, for added security, and contain multiple words that create a phrase. Passwords and passphrases help prevent unauthorized people from accessing files, programs, and other resources. When you create a password or passphrase, you should make it strong, which means it's difficult to guess or crack. It's a good idea to use strong passwords on all user accounts on your computer. If you're using a workplace network, your network administrator might require you to use a strong password.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Changing the password regularly is an important practice to keep the information secure. If passwords such as e-mail passwords, software admin passwords and control panel password are not changed for a longer time or using the same password for multiple items the chances are high for a hacker to capture the data.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3d Password: Synopsis

    • 597 Words
    • 3 Pages

    Brief Description : The passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen.…

    • 597 Words
    • 3 Pages
    Good Essays