CYBERSECURITY

Tips For Passwords And Security

The choice and management of passwords has been a recurring and controversial issue for many years. While the simple users of networks and online services are mostly annoyed by the topic of password protection – and just as often overwhelmed – system administrators try to close security gaps in user behavior – and are still confronted again and again with the consequences of careless handling of password security. But what exactly is a secure password? In order to be able to answer this question better, one should first take a look at the methods with which attackers usually take possession of someone else’s password.

Brute Force and Dictionaries: Password Attacks

The obvious method of guessing a password is also the less likely one: Repeatedly entering passwords directly, even if it is automated, is inefficient and time-consuming. Since the server that is the target of the attack always needs a certain amount of time to check the password and for its answer, only a very limited number of attempts can be made within a certain period of time. The attack would also be noticed and prevented by administrators after a short time. Such an approach makes most sense if a password was previously spied out in a different way (e.g. through social engineering) or if it can be easily guessed from other sources.

Attacks on entire password files are much more common: Most server systems store the identities of their users together with the passwords in password files. The password is encrypted by a hash function into a random sequence of characters from which it can no longer be derived. If attackers get hold of such a password file, they can calmly encrypt millions of possible passwords using the hash function and compare the results with the entries in the password file. Each match then corresponds to a “cracked” password.

There are essentially two methods for guessing passwords. One is to try any character string below a certain length. This method, known as brute force, checks all character combinations without gaps and is therefore comparatively complex. A more elegant approach is the dictionary attack: The attacker goes through lists of possible passwords one after the other. Such lists can be found on the Internet and have grown to many millions of entries over the years.

The secure password?

So what makes a high quality password out? Everyone knows the instructions given to newcomers on websites when choosing a password: it should have at least 8 characters and contain upper and lower case letters as well as numbers and special characters. The creation of a password is always a question of weighing up security versus forgetfulness, password protection versus convenience. As important as password security is, a password that is repeatedly forgotten is useless. This is one of the reasons why the objection is repeatedly raised that it makes more sense to allow (or require) longer passwords. In other words, passwords consisting of several easy-to-remember words, connected by special characters, for example, instead of a jumble of characters that its owner forgets far too quickly. Another problem is the increased need for passwords per person.

So there is no silver bullet to a secure password. But there are a number of criteria and rules of conduct that increase the quality of passwords, make them more secure and thus protect sensitive information.

Passwords: dos and don’ts

  • Choose different passwords for all purposes.
  • Do not use passwords that can easily be derived from your life and environment. No names of people or pets, no dates of birth or anything like that.
  • Choose a long password, but not one that consists of only one word that can be found in the dictionary or encyclopedia. Rule of thumb: If a search engine finds matches for your password, you should choose a different one.
  • If you want to remember the password more easily, choose a chain of several simple words connected by numbers or special characters. The resulting password should then be very long.
  • The more different types of characters (upper and lower case letters, numbers and special characters) the password contains, the better.
  • If you want or have to write down the password, only do so by hand and keep it away from the computer if possible. No sticky notes at the edge of the screen!
  • If the browser offers you to save a password, think carefully about who has access to the computer. If in doubt, it is better not to save.

Also Read: Why Is Password Security So Important?

Tech Today Reviews

We are the team who always Provides about latest technology news, latest gadget reviews which are recently released with all specifications to all our readers.

Recent Posts

Mind Mapping: Better Organization And Increased Productivity

Let's imagine a world where your ideas and information are freed from the monotony of…

3 days ago

How Can Organizations Protect Sensitive Data In Big Data Environments?

Managing a big data environment is challenging, especially when you have sensitive, high-risk information to…

6 days ago

Router Guide: Which Router Is Best For You?

For surfing at maximum speed, not only the Internet connection is important. The router is…

1 week ago

The Benefits Of Apple Pay: Streamline Transactions For A Connected World

In an increasingly digital and fast-paced world, the need for convenient and secure payment solutions…

2 weeks ago

ChatGPT: Opportunities And Risks Of Revolutionary Development

Who doesn't know it by now, the most well-known little AI helper in everyday working…

2 weeks ago

Entrepreneur In Communication: Mistakes To Avoid

Are you ready to embark on the entrepreneurial adventure of the communication sector? Congratulations! Before…

3 weeks ago