Question

Why do you believe these passwords are used? Why might the number of websites and devices...

  • Why do you believe these passwords are used? Why might the number of websites and devices accessed by the average person contribute to people using weak passwords? What have you done to build stronger passwords?
  • What are the dangers of using public Wi-Fi? How can you guard against exposing your personal information when accessing public Wi-Fi?
  • How could you minimize the risks imposed by computer viruses, hacking, spyware, and phishing using security software suites?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

Passwords are the maximum not unusual shape of authentication used to manipulate get entry to the information, which is ranging from the very personal identification numbers we use for computerized teller machines, credit score cards, telephone calling playing cards, and voice mail systems to the more complex alphanumeric passwords that shield access to files, computer systems, and community servers. Passwords are extensively used because they're comfortable, less expensive, and handy mechanisms to use and implement.

At equal time, passwords also are recognized as being an exceedingly bad form of safety. The computer Emergency response team (CERT) actually estimates that about eighty % of the security incidents which are reported to them are related to poorly chosen passwords. Password problems are very tough to control due to the fact a single local pc community may also have loads or hundreds of password-blanketed debts and only one desires to be actually compromised to basically give an attacker an entree to the neighborhood system or community.

do not use your login or user name in any form (as-is, reversed, capitalized, doubled, and so forth.)
Don't use your first, middle, or last call in any way.
Do not use your spouse's, significant other's, kid's, pal's, or pet's name in any form.
Do not use different facts easily obtained approximately you, together with your date of start, registration code variety, phone quantity, social protection range, make of your automobile, house cope with.
Don't use a password which contains all digits or which contains all of the identical letters.
Don't use a phrase contained in English or overseas language dictionaries, spelling lists, acronym or abbreviation lists, or other lists of words.
Don't use a password containing fewer than six characters.
Don't deliver your password to any other character for any cause.
Do use a password with mixed-case characters (in which supported).
Do use a password containing non-alphabetic characters (digits and punctuation)
Do use a password that is straightforward to don't forget, so that you don't need to write it down.
Do use a password that you may kind speedy, while not having to take a look at the keyboard.

Note: Brother According to HomeworkLib's policy we are only allowed to answer first part if there are many. So, I request you to post other part as separate posts.

Kindly revert for any queries

Thanks.

Add a comment
Know the answer?
Add Answer to:
Why do you believe these passwords are used? Why might the number of websites and devices...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT