Preview

Creating a Stronger Password

Good Essays
Open Document
Open Document
639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Creating a Stronger Password
Tips for creating strong passwords and passphrases
A password is a string of characters used to access information or a computer. Passphrases are typically longer than passwords, for added security, and contain multiple words that create a phrase. Passwords and passphrases help prevent unauthorized people from accessing files, programs, and other resources. When you create a password or passphrase, you should make it strong, which means it's difficult to guess or crack. It's a good idea to use strong passwords on all user accounts on your computer. If you're using a workplace network, your network administrator might require you to use a strong password.
Note
· In wireless networking, a Wi-Fi Protected Access (WPA) security key supports the use of a passphrase. This passphrase is converted into a key that is used for encryption, which is not visible to you. For more information about WPA security keys, see What are the different wireless network security methods?[->0]
What makes a password or passphrase strong?
A strong password: |A strong passphrase: |
· Is at least eight characters long.· Does not contain your user name, real name, or company name.· Does not contain a complete word.· Is significantly different from previous passwords.|· Is 20 to 30 characters long.· Is a series of words that create a phrase.· Does not contain common phrases found in literature or music.· Does not contain words found in the dictionary.· Does not contain your user name, real name, or company name.· Is significantly different from previous passwords or passphrases.|

Strong passwords and passphrases contain characters from each of the following four categories:
Character category|Examples|
Uppercase letters|A, B, C|
Lowercase letters|a, b, c|
Numbers|0, 1, 2, 3, 4, 5, 6, 7, 8, 9 |
Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces|` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /|
A password or

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    The information that it’s giving me is that its showing the wireless networks around my area. A security key.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    A wireless access point (WAP) is a device that usually connects to a router and acts like a switch. WAPs utilise wifi to connect to devices to allow communication between them. WAPs are used to extend the wireless reach of a network or to allow wireless access to that network. Unlike a router or switch, the WAP does not filter data and has no inbuilt firewall, so does not add to the security of the…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 3 research

    • 383 Words
    • 2 Pages

    substitutions: represented by italicized characters, indicating that the element is composed of characters provided by the user.…

    • 383 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When WPA or WPA2 is used in “personal” mode, what is true of the authentication key used?…

    • 778 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Password Strength

    • 5555 Words
    • 23 Pages

    A password is a secret word or string of characters that is used for user authentication to prove identity, or for access approval to gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging in to accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online.…

    • 5555 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Wireless networking has been an issue of security since its creation. With early technology it was simple to steal someone’s data or connect into their LAN. Some advances were made, such as encryption and the need for MAC (media access control) addresses on the access point, but it was still relatively simple to bypass these security methods. New solutions in wireless networking security such as CCE, WPA, and AES are helping to destroy misconceptions and improve security. The first real standard for wireless security was WEP (Wired Equivalent Protection). It did not live up to its name. WEP offered only basic security. There are free utilities available online which can be used to find wireless networks and attempt to gain access, such as AirSnort. Its simplicity to crack comes from the use of a static 40 bit encryption key. This key had to be entered manually on…

    • 607 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Public Key Encryption

    • 330 Words
    • 2 Pages

    - A symbol representing a lock may appear in a locked position somewhere on your browser (often in the bottom right corner).…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Although Springer, as a publisher of STM content, makes use of a wide range of Unicode characters, this content does not require the use of the entire range of possible Unicode characters (96,382 in Unicode 4.0). As a result we have determined the subset of characters that we support. This subset goes far beyond the characters belonging to the standardized ISO entity sets familiar from SGML. The standard Unicode set itself does not contain all the characters that we require.…

    • 10693 Words
    • 43 Pages
    Powerful Essays