Preview

Unit 1 Assignment 1: A Super Strong Unique Password

Good Essays
Open Document
Open Document
691 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1: A Super Strong Unique Password
 super strong, unique password.
Ensuring that your password is difficult to guess is not an easy task.
You have to come up with creative password.
One way is to use first letter of each word in a sentence and use that acronym as the base of your password.
You can also prefer a mixture of upper case and lower case letter with numbers
.
 Password and multiple services Never use same password for different sets of services like personal security and social networking sites so that if will prevent hacker Need one of your password then it has access to all your sites

 Enable two-factor authentication.
Many services, including has Google, offer two-factor authentication for logging into your account. Instead of simply entering a username and password to log in, the website will prompt you to enter a code sent to your smartphone
…show more content…
Look for the little padlock symbol in front of the web address in the URL bar. Also, make sure the web address starts with the prefix https://. If these things aren't there, then the network isn't secure and you shouldn't enter any data you wouldn't want made public.

 Don't send personal data via email. Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.

 Keep an eye out for phishing scams. A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.
These web entities are designed to look like a normal email or website, that’s how hackers convince their victims to hand over personal information.
Phishing scams are typically easy to spot, but you should know what to look out for. Many of these emails contain spell errors and are written in poor grammar.
For e.g. MICROSOFT SECURITY BLOG ;

 Avoid logging into your important accounts on public

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    (Important: Copy and paste the password into the portal password field. If you get a “locked out” message, notify an ASR asap.)…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Personal information is vital and important resources for each person in the world. Our personal identification or information as important as an account information for a company exists. How personal information gets affected on web? Well, In this decade we are totally depend on the Internet and we can not live a single day without Internet. So somehow we have to share our personal identification in online to satisfy our daily needs and requirements without even concerning what will going be happen next if my personal information goes in wrong hands.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It is impossible to use two different Google accounts in the same browser. If I am logged in to my email and my husband’s email in two different windows, as soon as I start clicking around, it automatically refreshes to show the last account I logged in to. Private browsing helps with this. Just open one normal browser window and a second browser window with private browsing enabled.…

    • 304 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Spam – This refers to sending of bulk emails to people’s addresses without their consent or authority usually for commercial purposes. Fraud on the other hand refers to misrepresentation of facts with the intention of inducing another into doing or refraining to do a particular action which results into a loss. Fraud is committed in a number of ways. The first one is alteration of computer input which is common as it does not require much expertise.…

    • 624 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With there being limited or almost no control over personal information online there comes a huge risk of security at hand, according to Daily Mail it has been estimated that 12,300 cases of murder, sex predation and rape are related to these websites in one way or another annually. Often new violent trends have broken out…

    • 763 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NTM Review

    • 454 Words
    • 4 Pages

    Passwords – Use symbols, not personal information. Don’t use function keys. Symbols mix upper and lower case, numbers.…

    • 454 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Cut and paste the cmd.exe file in desktop and rename this file from cmd.exe to sethc.exe…

    • 614 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Internet Vocabulary

    • 1414 Words
    • 6 Pages

    Phishing: is the act of attempting to acquire information, such as username and password by masquerading as a trustworthy entity in as electronic communication…

    • 1414 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    * Rachna Dhamija, Adrian Perrig, Déjà Vu: A User Study Using Images for Authentication. 2000, Denver, Colorado, pages 45-58.…

    • 4892 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    SOURCES OF COMPUTER VIRUS

    • 741 Words
    • 2 Pages

    2. Through Email attachments: When the source of an email attachment is not known and trusted it should not be opened especially the messages of “get rich quickly”. Some of them are Scam and coded virus. This kind of offer is usually appealing and used as a bait to trap the unsuspecting public or computer user.…

    • 741 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Our Final Case Study

    • 746 Words
    • 3 Pages

    Prompt the user to input a username and password. Password must be invisible or may not be seen by anyone. If the username and password matched in the specified username and password of the program the user will proceeds otherwise ask to try again.…

    • 746 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Related Studies

    • 530 Words
    • 3 Pages

    a sequence of instructions, stored in any medium, that can be interpreted and executed by a computer; - called most frequently a program. This term is used both for the written program (a document) and for its corresponding electronic version stored or executed on the computer.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays