Password

4 40
Avatar for Bangs1803
1 year ago
Pict from www.istockphoto.com

In the online world or the internet, you must be familiar with passwords, when we are going to log in to some web or social media such as going to a gmail account or social media such as Facebook, Instagram, Twitter, etc., one of the things we have to write down is password , password is something secret no one should know but us.

For example, when we are going to enter the house so that the house can be opened, we have to use the key, so that other people cannot enter our house, so don't give the key to someone else. well that's the description of the password

So what exactly is the meaning of the password itself.

Pict from www.istockphoto.com

In today's technological era, almost every aspect of life cannot be separated from an internet connection, in everyday life such as business, financial transactions, communication, social networking, from ordering food to ordering motorcycle taxis are also done with an internet connection. We are very spoiled with the facilities provided by these companies. But behind the convenience that we often ignore is a security issue. Data security and application security are very important things to consider when using Internet services

A well-known method of securing information systems is passwords. Without realizing it, passwords have an important role in securing personal (confidential) information. In some software related applications, such as mobile phones, ATM cards, etc.

Password

is one of the difficult security procedures to attack, an attacker can have many tools (about technical aspects as well as in social life) just to open something password protected. But many users don't care what password they have. Many password users create passwords carelessly without knowing password policies and how to create strong passwords. They are not aware of the dangers of password attacks that can steal or destroy information. When an attacker manages to get hold of a user's password, he will have the same authority as this user. Therefore, cryptography and computer security systems are indispensable. However, ironically, as the science of cryptography for encrypting information has grown, there have also been ways to counter it

Also, passwords are by no means a form of speech; Of course, non-meaningful passwords are harder to guess. In addition, a passphrase is often used to describe something that is more accurately known as a passphrase. Passwords are also sometimes used in numeric (numeric) only; An example is a personal identification number (PIN). Passwords are usually short enough to be easy to remembe

Password progression

The development of password authentication can be seen with examples of weak and vulnerable systems, most of which are still in use today. Following are some of the main categories of password authentication systems

Pict from www.istockphoto.com

1. Weak Authentication

In general, weak authentication systems are characterized by protocols that can leak passwords directly into the network or leak enough information for "attackers" to know to be able to analyze and guess the password.

2. Strong Authentication

Although good encryption has been around for decades, the development of strong pass-through authentication protocols only started in 1990 with the release of the EKE math "algorithm family.

3. Inconvenient Authentication

In the absence of strong, easy-to-use password authentication technologies, system designers in the 1980s tried other techniques to ensure password security. Most of these systems are not completely password-based and often require something extra from the user, administrator, or both to function properly.

Password Policy

Pict from www.istockphoto.com

Security Policy A security policy or commonly known as a password policy is a set of rules created to increase the security of information by encouraging users to use strong passwords and use them appropriately. Privacy policies are often part of an organization's official regulations. Security policies can be reported or defined by performing various types of checks on the operating system.

Security policies are generally simple and commonly used, which all system users can understand and follow. It contains a level of security that can protect the important data stored by each use

Some things that are taken into account in the security policy are who has access to the system, who is allowed to install programs in the system, who owns what data, fixes for possible crashes, etc.

10
$ 2.95
$ 2.82 from @TheRandomRewarder
$ 0.05 from @Ayukyukyu2
$ 0.03 from @Talecharm
+ 2
Sponsors of Bangs1803
empty
empty
empty
Avatar for Bangs1803
1 year ago

Comments

Are you using the same password that most people use? For example, the child's name, date of birth or something that is easy to remember? lol

$ 0.00
1 year ago

that's right, I use 1 password for several accounts, web, social media. Lol

$ 0.00
1 year ago

I used many password in before and i forget. But now I like to use same password.

$ 0.00
1 year ago

I always enter almost the same password and there must be a word. When creating an account and password, all the names I make are considered weak when I enter the word Kyu, it's ok

$ 0.00
1 year ago