CYBER SECURITY
Read and gain knowledge about cyber security.
3. Privacy & data protection
3.2. Passwords
The main purpose of passwords is to protect information and other computer resources: emails, files on your computer, devices, etc. Passwords can be likened to the keys to your room door - by locking the door, you protect your room from thieves, vandals or uninvited guests. It is common for a door key to be unique, and it is unlikely that anyone will find another key that can unlock your door. The more complex the key shape, the harder it will be to find another suitable key. The same can be said for a password. The easier the password is to guess, the less secure your information will be. Passwords can be guessed by knowing certain facts about a person (date of birth, phone or car numbers, names of family members, etc.) or simply by using common dictionary words.
Examples of poor, weak passwords are also sequences of repeating characters (e.g. abab1212), sequences of characters that match the layout of the keyboard (e.g. qwerty).
A good password should consist of letters (upper and lower case), numbers and special characters. You can use a well-known phrase to create a good password that is easy to remember. By taking the first letters or consonants (second, last letters) of such a phrase, changing the letters into special characters or numbers (by any association), you will get a password that is hard to guess but easy to remember.
Example:
Let's take the phrase: Dad knocks, Mom knocks
Let's collect the consonants and the symbol ",": Ttkl,Mmml
Let's make the changes Tt = 2T; Mmm = 3m .
We get the password 2Tkl,3ml
Attention! Never use the password in this example.