Preview

Unit 1 Assignment 1: A Super Strong Unique Password

Good Essays
Open Document
Open Document
691 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1: A Super Strong Unique Password
 super strong, unique password.
Ensuring that your password is difficult to guess is not an easy task.
You have to come up with creative password.
One way is to use first letter of each word in a sentence and use that acronym as the base of your password.
You can also prefer a mixture of upper case and lower case letter with numbers
.
 Password and multiple services Never use same password for different sets of services like personal security and social networking sites so that if will prevent hacker Need one of your password then it has access to all your sites

 Enable two-factor authentication.
Many services, including has Google, offer two-factor authentication for logging into your account. Instead of simply entering a username and password to log in, the website will prompt you to enter a code sent to your smartphone
…show more content…
Look for the little padlock symbol in front of the web address in the URL bar. Also, make sure the web address starts with the prefix https://. If these things aren't there, then the network isn't secure and you shouldn't enter any data you wouldn't want made public.

 Don't send personal data via email. Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.

 Keep an eye out for phishing scams. A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.
These web entities are designed to look like a normal email or website, that’s how hackers convince their victims to hand over personal information.
Phishing scams are typically easy to spot, but you should know what to look out for. Many of these emails contain spell errors and are written in poor grammar.
For e.g. MICROSOFT SECURITY BLOG ;

 Avoid logging into your important accounts on public

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Chief Seattle

    • 259 Words
    • 2 Pages

    |change your passcode to something more personal to you. If you have already logged onto our site, use|…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (Important: Copy and paste the password into the portal password field. If you get a “locked out” message, notify an ASR asap.)…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit, communications, PR, marketing, the Web group, customer service and legal services.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Social engineering attacks are another concern for our company. People tend to use sites like Facebook in order to communicate with other employees, family, and friends. It is in our best interest to have strict policies constantly in place to validate the uniqueness of the user prior to a password reset being made.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Personal information is vital and important resources for each person in the world. Our personal identification or information as important as an account information for a company exists. How personal information gets affected on web? Well, In this decade we are totally depend on the Internet and we can not live a single day without Internet. So somehow we have to share our personal identification in online to satisfy our daily needs and requirements without even concerning what will going be happen next if my personal information goes in wrong hands.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When you are logging in to a public computer at work or a friend’s computer, you may not want other people to see what you are doing. Private browsing does not save usernames or passwords so it will protect your information. I babysit at a friend’s house three days a week and use their computer to do my schoolwork. I always use private browsing when logging in to my.snhu.edu.…

    • 304 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Spam – This refers to sending of bulk emails to people’s addresses without their consent or authority usually for commercial purposes. Fraud on the other hand refers to misrepresentation of facts with the intention of inducing another into doing or refraining to do a particular action which results into a loss. Fraud is committed in a number of ways. The first one is alteration of computer input which is common as it does not require much expertise.…

    • 624 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With there being limited or almost no control over personal information online there comes a huge risk of security at hand, according to Daily Mail it has been estimated that 12,300 cases of murder, sex predation and rape are related to these websites in one way or another annually. Often new violent trends have broken out…

    • 763 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    * Rachna Dhamija, Adrian Perrig, Déjà Vu: A User Study Using Images for Authentication. 2000, Denver, Colorado, pages 45-58.…

    • 4892 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Cut and paste the cmd.exe file in desktop and rename this file from cmd.exe to sethc.exe…

    • 614 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Our Final Case Study

    • 746 Words
    • 3 Pages

    Prompt the user to input a username and password. Password must be invisible or may not be seen by anyone. If the username and password matched in the specified username and password of the program the user will proceeds otherwise ask to try again.…

    • 746 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Related Studies

    • 530 Words
    • 3 Pages

    a sequence of instructions, stored in any medium, that can be interpreted and executed by a computer; - called most frequently a program. This term is used both for the written program (a document) and for its corresponding electronic version stored or executed on the computer.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays