How To Choose Secure Password

How To Choose Secure Password

What is Secure Password


From the first day of computing. The Complete Time-Sharing System (CTSS), introduced at MIT in 1961, was the first computer system to implement secure password login.

A password is a secret word that you need to know to allow you to know the place
A passcode is called a memorized secret because a password is usually used to confirm a user's identity.


Secure Password What is Secure Password



Use the terminology of the NIST Digital Identity Guidelines
This secret is remembered by the party known as the applicant, while the party identifying the applicant is called the verifier. When the applicant successfully demonstrates password knowledge to the verifier through the established authentication protocol, the verifier is able to determine the identity of the applicant.


The password is an arbitrary thread of characters, including letters, numbers, and other symbols. If the permissible characters are bound to be numerical, then the corresponding secret is sometimes called a personal identification number (PIN).


In modern times, the names and passwords that people use during the login process are commonly used on protected computer operating systems, mobile phones, cable TV decoders,
Automatic teller machine (ATM) etc.


The average computer user has passwords for a variety of reasons, including accounts, logging into the network.
Retrieving e-mails, accessing applications, databases, websites, and reading the morning newspaper online.


Insecure password


As mentioned above, the easiest and most common way to hack into any account is to use a simple password or do a little research about the victim who intends to use some passwords related to that person.


The 2018 survey states that the most commonly used passwords are listed below

* Password
* Qwerty
* 12345
* 123456
* 12345678
* 12345
* 123456789
* Sunshine.


These are very insecure passwords. They easily guess and start trying to access your account with weak passwords like cyber-criminals.

We recommend that you never use passwords with the following information

* Your family name
* Your birthday or that of your family/friends
* Pet names
* Places where you live or stay with the names of cities or streets


Top 5 Password-Cracking Attacks



1. Brutal force attack


Brute force attack is the most common password attack technique and is easy for hackers to do. In fact, inexperienced hackers are advocating this technique precisely for this reason.

In a forcible attack, the hacker uses a computer program to log in to the user's account with all possible additions. Furthermore, brutal power accounts do not start randomly; They start with the simplest guessing passwords.

Don't forget that if a hacker gains access to your to-do list, there is no challenge in guessing your last name.


2. Dictionary attack


Dictionary Attack allows hackers to use programs that cycle through common words.
The brutal power attack goes from letter to letter, while the dictionary attack only tries the chances of success.

Dictionary attacks depend on some key elements of the user's psychology.
For example, users choose short passwords and base their passwords on common passwords. So the dictionary attack starts with those words and forms (adding numbers at the end, changing the letters with numbers, etc.).


3. Keylogger attack


Keylogger Attack installs a program on users 'endpoints to track all users' keystrokes.

So when users type in their usernames and passwords, hackers record them for later use. It technically falls into the category of malware or digital viruses, so it must first be transmitted to the end-user.


4. Rainbow table attack


Carefully, enterprises always hash their users' passwords; Hashing converts math into cryptographic, random-character threads to prevent password cache misuse. If hackers can't read passwords, they can't misuse them.

Hashing sounds like a strong security mechanism. That's not wrong. In fact, hashing your password is the difference between a reputation that destroys reputation and a problem that worries but solves it.
However, we can see that this does not always work.

For example, the Rainbow table completes the list of pre-computed hashes. It already has mathematical answers for all possible password combinations for the common hash algorithm.
Like other identity management threats, it uses the time to your advantage.

5. Hybrid attack


A hybrid attack is a combination of both a dictionary attack and a brutal power attack. This means that if the dictionary attack technique includes a one-word list of passwords, brutal force attacks will apply to every possible password on the list.


Secure Password What is Secure Password




Tips for choosing a secure password


To avoid falling prey to these types of hacks, secure password tips can be found below.


Note 1. Create a long password Make sure your user password is at least eight and nine characters.


Note 2. Use two factors of authentications ( 2FA ) whenever possible 2FA adds another layer of security to any account you may be loggin into when using 2FA you can choose 2 of 3 types of identifications to provide.


1. A password or pin number.
2. A tangible item such as the last 4 digits of a credit card in your possession or a mobile device that code can be sent to.
3. A part of you such as a fingerprint or voice print 


Note 3. Use a combination of upper case and lower case letters symbols and numbers 


Note 4. Make sure your user password is at least eight characters long. The more characters and symbols you have in your password, the harder it is to guess.


Note 5. Use short sentences for passwords. You can choose the phrase "I want to go to England". You can abbreviate this phrase by using the first letter of each word and changing it from "word" to "number" 2.. This will result in the following basic password phrases: iw2g2e. Make it more complicated by adding punctuation, spaces or symbols:% iw2g2e! @


Note 6. Log out when you have finished using the website and the device.



                      Choose the right solution for you.

Comments

Popular posts from this blog

What Is Cyber Security And Types Of Cyber Attacks

What Is Hacking Introduction, History And Classification