Preview

Making Strong Passwords

Better Essays
Open Document
Open Document
1119 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Making Strong Passwords
Making Strong Passwords
Name
University
Professor Name
Course Name
Date
Making Strong Passwords In today’s society, computer-based user accounts that require a username and password are very common in workplaces, schools, and homes for various applications. E-mail accounts, online bank accounts, social networking profiles, and many other instances of private information are all secured by user created passwords. With so much data at risk, it should be safe to assume people would generate passwords worthy of protecting their assets. However, a study performed by Burnett (2006) of millions of passwords revealed that the top five-hundred user passwords were significantly weak and at extremely high risk of theft. In order to properly safeguard user accounts and associated data, users must disregard sub-par password creating practices and learn to create unique, complex, and robust passwords. A concrete understanding of the composition of a weak password is required prior to attempting development of a strong password. A weak password can be easily guessed, cracked, or stolen for one or several reasons. Examples of weak passwords and explanations of why these passwords are weak will be provided in the next five paragraphs. By avoiding these mistakes, users can strengthen their passwords and ultimately provide better protection of sensitive information. A password should never consist of regular words that can be found in the dictionary like “soccer” or “watermelon” (Burnett, 2006). First, passwords that consist of common words have the potential to be guessed with enough attempts by a hacker, also known as a brute force attack (Bahadur, Chan, & Weber, 2002). Second, passwords that are dictionary words are vulnerable to another type of brute force attack called a dictionary attack (Nemati, 2011). A dictionary attack is an attack in which a hacker uses software to attempt to guess a password by entering every word in the dictionary



References: Bahadur, G., Chan, W., & Weber, C. (2002). Privacy defended: Protecting yourself online. Indianapolis, IN: Que. Burnett, M. (2006). Perfect passwords: Selection, protection, authentication. Rockland, MA: Syngress. Gupta, M., & Sharman, R. (2009). Social and human elements of information security: Emerging trends and countermeasures. Hershey, PA: IGI Global. Nemati, H. R. (2008). Information security and ethics: Concepts, methodologies, tools, and applications (Vols. 1-6). Hershey, PA: IGI Global. Nemati, H. R. (2011). Security and privacy assurance in advancing technologies: New developments. Hershey, PA: IGI Global. Vacca, J. A. (2010). Network and system security. Burlington, MA: Elsevier.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, the weak link is the user. Simple passwords can be a major problem so you must use complex passwords with eight or more characters, upper and lower case, and special characters. Passwords will be changed monthly and the same password cannot be used within a twelve month period.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…

    • 599 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Thus, it should not be surprising that in 2006 more than 50 Million Americans have had personal information compromised due to unforeseen security breaches such as these (Bigelow, 2006). Personal and organizational data must be safeguarded from unwanted intruders, hackers and thieves.…

    • 338 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    By using these preventative measures businesses can save the U.S $44 billion dollars, productivity and time associated with recovering data from a breach. Also stated in this article was how 70% of security breaches occur because of an end user error. This is why it is necessary to insure ourselves with better technology such as backup data loss prevention and encryption to defend data from human error, as stated above. We have to remember that hackers invent new methods every day to get their hand on important information, and that is why you can never be too careful when it…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Deloitte Case Study

    • 27817 Words
    • 112 Pages

    Technology, Media & Telecommunications Predictions 2013 Contents Foreword3 Technology5 The PC is not dead: it’s about usage not units6 Bring your own computer: a tale of two interpretations9 P@$$1234: the end of strong password‑only security11 Enterprise Social Networks: another tool, but not yet a panacea14 Let’s get together: crowdfunding portals bring in the bucks16 The button stays beautiful19 Media23 4K kicks off24 Dual video screening readies for prime time27 Connected TV: hits and misses29 Over‑the‑top may lift legacy broadcasters and distributors more than pure plays31 The reality of “cord cutting” in North America33 Telecommunications35 A strong year for LTE adoption36 Smartphones ship a billion but usage becomes simpler39 “Mobile” advertising is dead.…

    • 27817 Words
    • 112 Pages
    Powerful Essays
  • Powerful Essays

    with their smartphone, which is a convenient alternative to passwordbased login. We find that many schemes in the literature (including,…

    • 7714 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to provide step by step instructions along with the reasons for doing it this way. Other times I will point to a particular website where you find the information. In those cases someone else has done what I attempting and did a good or great job and I did not want to steal their hard work. These instructions have several excerpts from a combination of posts from pureh@te, granger53, irongeek, PrairieFire, RaginRob, stasik, and Solar Designer. I would also like to thank each of them and others for the help they have provided me on the BackTrack forum. I will cover both getting the SAM from inside windows and from the BackTrack CD, DVD, or USB flash drive. The SAM is the Security Accounts Manager database where local usernames and passwords are stored. For legal purposes I am using my own system for this article. The first step is to get a copy of pwdump. You can choose one from http://en.wikipedia.org/wiki/Pwdump. Update: I used to use pwdump7 to dump my passwords, however I have come across a new utility called fgdump from http://www.foofus.net/fizzgig/fgdump/ This new utility will dump passwords from clients and Active Directory (Windows 2000 and 2003 for sure, not sure about Windows 2008) where pwdump7 only dumps client passwords. I have included a sample hash.txt that has simple passwords and should be cracked very easily. NOTE: Some anti-virus software packages flag pwdump* and fgdump as trojan horse programs or some other unwanted program. If necessary, you can add an exclusion for fgdump and/or pwdump to your anti-virus package so it won't flag them. However it is better for the community if you…

    • 15485 Words
    • 62 Pages
    Good Essays