In the online world or the internet, you must be familiar with passwords, when we are going to log in to some web or social media such as going to a gmail account or social media such as Facebook, Instagram, Twitter, etc., one of the things we have to write down is password , password is something secret no one should know but us.
For example, when we are going to enter the house so that the house can be opened, we have to use the key, so that other people cannot enter our house, so don't give the key to someone else. well that's the description of the password
So what exactly is the meaning of the password itself.
In today's technological era, almost every aspect of life cannot be separated from an internet connection, in everyday life such as business, financial transactions, communication, social networking, from ordering food to ordering motorcycle taxis are also done with an internet connection. We are very spoiled with the facilities provided by these companies. But behind the convenience that we often ignore is a security issue. Data security and application security are very important things to consider when using Internet services
A well-known method of securing information systems is passwords. Without realizing it, passwords have an important role in securing personal (confidential) information. In some software related applications, such as mobile phones, ATM cards, etc.
Password
is one of the difficult security procedures to attack, an attacker can have many tools (about technical aspects as well as in social life) just to open something password protected. But many users don't care what password they have. Many password users create passwords carelessly without knowing password policies and how to create strong passwords. They are not aware of the dangers of password attacks that can steal or destroy information. When an attacker manages to get hold of a user's password, he will have the same authority as this user. Therefore, cryptography and computer security systems are indispensable. However, ironically, as the science of cryptography for encrypting information has grown, there have also been ways to counter it
Also, passwords are by no means a form of speech; Of course, non-meaningful passwords are harder to guess. In addition, a passphrase is often used to describe something that is more accurately known as a passphrase. Passwords are also sometimes used in numeric (numeric) only; An example is a personal identification number (PIN). Passwords are usually short enough to be easy to remembe
Password progression
The development of password authentication can be seen with examples of weak and vulnerable systems, most of which are still in use today. Following are some of the main categories of password authentication systems
1. Weak Authentication
In general, weak authentication systems are characterized by protocols that can leak passwords directly into the network or leak enough information for "attackers" to know to be able to analyze and guess the password.
2. Strong Authentication
Although good encryption has been around for decades, the development of strong pass-through authentication protocols only started in 1990 with the release of the EKE math "algorithm family.
3. Inconvenient Authentication
In the absence of strong, easy-to-use password authentication technologies, system designers in the 1980s tried other techniques to ensure password security. Most of these systems are not completely password-based and often require something extra from the user, administrator, or both to function properly.
Password Policy
Security Policy A security policy or commonly known as a password policy is a set of rules created to increase the security of information by encouraging users to use strong passwords and use them appropriately. Privacy policies are often part of an organization's official regulations. Security policies can be reported or defined by performing various types of checks on the operating system.
Security policies are generally simple and commonly used, which all system users can understand and follow. It contains a level of security that can protect the important data stored by each use
Some things that are taken into account in the security policy are who has access to the system, who is allowed to install programs in the system, who owns what data, fixes for possible crashes, etc.
Are you using the same password that most people use? For example, the child's name, date of birth or something that is easy to remember? lol