Preview

Password Protection

Good Essays
Open Document
Open Document
4064 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Protection
Today, everyone is having online banking account and e-mail account . Safety is an important aspect. If some intruder steal our password, then we have to pay high price for it. So protecting password is a significant factor for each and every one in this e-world. This speech provides mechanism to protect our online password.

Choosing a Good Password

Your password is what tells the computer that you are who you say you are. Until we can do retina scans like in James Bond movies, the password is the best that we can do. But, because your password is like a key to your account, you need to safeguard it. Anyone who has your password can get into your account, and your files. Anyone who can guess your password has it. Anyone who has your password can pose as you. Therefore, you may be held responsible for someone else's actions, if they are able to get your password. You may not wish this to happen.
Tips on safeguarding your password * First and foremost, NEVER give your password to anyone. ``Anyone'' means your coworkers, your spouse, your systems administrator. In the event of an emergency, the sysadmin can change your password. Your sytems administrator never has a need to know your personal password. If someone needs to get onto our machines, and has a reason to be here, do not give them access to your account. Speak to the systems staff about us setting up an account for them. We would be very happy to give them one. * Make your password something you can remember. Do not write it down. If you really, honestly forget your password, we can easily give you a new one. We'd rather set your password once a month because you forgot it than have someone find it written down and gain unauthorized access to your account. * Make your password difficult for others to guess. This is not as hard as it initially seems. See the section below on chosing a good password. * DO NOT Change your password because of mail from someone claiming to be your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT321 Labs 1.1 - 1.7

    • 2018 Words
    • 38 Pages

    ! ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 enable password class ! ! !…

    • 2018 Words
    • 38 Pages
    Satisfactory Essays
  • Better Essays

    Concept Check 5-2 and 5-5

    • 500 Words
    • 2 Pages

    Use a secure browser, keep records of online transactions, review your monthly statements; read the privacy and security policies, keep your personal information private, never…

    • 500 Words
    • 2 Pages
    Better Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 1230 FINAL EXAM REVIEW

    • 542 Words
    • 2 Pages

    used to make sure that you don’t reuse the same password when changing the password? Enforce Password History…

    • 542 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Solution: Create a recurring change of passwords, say once every few months, for your company. Have the passwords require a combination of numbers and letters, as well as a special character.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Without passwords being assigned to data and systems, this simply protection becomes a target for hackers.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    7. Is it a good practice to include the account or user name in the password? Why or why not?…

    • 321 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    A virus is software that is written with malicious intent to cause annoyance or damage. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    7. It is a good practice to include the account or user name in the password? Why or why not?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    Yes, after reviewing the material I understand how to secure my computer. First, I should keep my operating system and all software up to date, have a firewall and antivirus software, use strong passwords, use protection devices such as surge protectors, back up data, and follow guidelines to limit unauthorized access and use to my computer. The most important part of computer security is me, the operator.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays