Preview

Password Strength

Powerful Essays
Open Document
Open Document
5555 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Strength
A password is a secret word or string of characters that is used for user authentication to prove identity, or for access approval to gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging in to accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online.

Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words may be harder to guess, a desirable property. Some passwords are formed from multiple words and may more accurately be called a passphrase. The term passcode is sometimes used when the secret information is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be easily memorized and typed.
Most organizations specify a password policy that sets requirements for the composition and usage of passwords, typically dictating minimum length, required categories (e.g. upper and lower case, numbers, and special characters), prohibited elements (e.g. own name, D.O.B., address, telephone number). Some governments have national authentication frameworks[1] that define requirements for user authentication to government services, including requirements for passwords.

Contents [hide]
1 Memorization and guessing
2 Factors in the security of a password system

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users.…

    • 287 Words
    • 1 Page
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant is that passwords can often be stolen, accidentally revealed, or forgotten.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Without passwords being assigned to data and systems, this simply protection becomes a target for hackers.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    a. To maximize confidentiality and to make passwords harder to crack, passwords should be of a minimum length (8 characters or more), complex (upper/lower case, numbers, and special characters), have a minimum password age (change periodically), and password history must be enforced (cannot use the last 10 passwords).…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Security, in its earliest years, consisted of mainly physical security, the need to safeguard the equipment itself. During the next decade, when ARPANET grew in use, more advanced security was needed. This led to the creation of MULTICS, an operating system with security being its main concern. From MULTICS spawned the UNIX operating system which did not require the same in-depth levels of security. In the early 1970's the password function was implemented as one of the first security measures. As computers and networking became more wide spread, during the 1990's, some security measures were implemented though they were seen as a low priority. Because of the lack of security in the start, we now have…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…

    • 599 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    8. Under which of the following conditions are Windows 7 local user accounts required to use complex passwords? When the computer is joined to a domain.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    analysis are either built into the operating system, or are available at no cost. Two such tools for…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Password Cracking

    • 794 Words
    • 4 Pages

    Password cracking has matured in the past few years. New hardware and techniques has made…

    • 794 Words
    • 4 Pages
    Good Essays

Related Topics