Data is most valuable asset, How to protect a data with strong password?

SHARE:

The world is turning to the internet as well as the cyber risk also increasing day by day. So, internet users especially those who are using the internet for a bank transaction, social networking, and other critical web management should be very careful and enable all the available security to protect the valuable data / money / social status from the cyber criminals.

Today we are going to discuss the importance of strong passwords and additional layer security like Multifactor Authentication.

Weak and Strong Passwords

Weak passwords always a big risk in the cyber world because an attacker can easily guess the password or can crack using different tools. The strong password has also, risk but chances are very less to guess or break very easily so we can say the strong password + additional layer security can be better.

Example or Lists of Weak Passwords

123456, password, qwerty, 123456789, 12345678, 12345, 111111, 1234567, sunshine, qwerty, iloveyou, princess, admin, welcome, 666666, abc123, football, 123123, monkey, 654321, !@#$%^&*, Nothing, secret, Admin, User, iloveyou, admin

Common Password Cracking Methods

There are many passwords breaking methods currently using by hackers. Let us look at what it is and how it is.

  • Password Guess – In this method, the attacker guesses the password and try to find
  • Hardware/Software Key Logger – A key logger may be a malicious tool or small hardware to capture the keys. The virtual keyboard help to prevent this type of attack.
  • Dictionary Attack – The hacker uses a list of words and tries all the probability to find the right one.
  • Brute-Force Attack – This is similar to Dictionary Attack, the attacker additionally uses the non-dictionary words, alpha-numeric combinations, etc.
  • Combinator Attack - This attack is adding dictionary words to other dictionary words and try to find the password.  Example: Two dictionary words 'very' and 'good'. Combinator Method - verygood
  • Rainbow Table Attack – This method uses pre-computed database hashes and find the right match

How to Create Strong Passwords?

As mentioned, the strong password comparatively safe and even less chance to crack or guess easily so it is better to create a password policy to enforce the strong password. Remember the following points when you are going to create a password.

Password Length

Password History

Mixture Combinations

Let us look at the best practice and policies

The Passwords should meet complexity requirements

Never set up a password that contains personal info like User Name, Mobile No, House Name and other guessable.

Never use common passwords and dictionary words.

The password must be at least 8 characters length.

Use the combinations of uppercase, lowercase letters, and special symbols.

Never use of previously used passwords.

Conclusion

The passwords are the key to the valuable thing so always ensure to set a strong password plus additional layer security like 2 step verification or any other available features. Here we discussed the different password breaking techniques importance of a strong password. The next article will explain the importance of the 2 step verification with a few demos.

COMMENTS

Name

Access Point,1,android,1,Anti Virus,3,Applications,4,authenticator,2,AWS,7,BIOS,2,Broadband,1,Channel,1,Cisco,9,Cisco IOS,6,Cloud Computing,7,commands,1,Communication,3,Cyber Security,9,Desktop,8,development,3,devops,4,Driver,3,Email,7,FreeBSD,2,FTTH,1,G Suite,2,Google,11,GoogleCloud,9,Hardware,8,hypervisor,6,Interface,2,Internet,17,IT Administration,22,LAN,4,Laptop,5,linux,3,Mail Server,1,Microsoft,9,Microsoft Product,1,mobile,1,Motherboard,1,Network,8,Nodes,2,online banking,1,Open Source,6,Operating System,12,Operation System,1,Parenting,1,Protocols,1,Proxmox,12,Robotics,1,Router,3,Routing,3,RPA,1,sdlc,1,seo,1,Server,1,smartphone,1,Switch,1,tech event,1,techlabs,4,TechTrends,1,Virtualization,12,VMware,2,VPN,1,web,2,website,1,WiFi,1,Windows,11,Windows Registery,1,Wireless,1,workspce,2,
ltr
item
TheWanTricks.com: Data is most valuable asset, How to protect a data with strong password?
Data is most valuable asset, How to protect a data with strong password?
The world is turning to the internet as well as the cyber risk also increasing day by day.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZZrB27bSdcY9XVCZOTZumasXhUzmYjhCOZ3BBP5g-2JgWm6pQngUs8ThTphUN1xdOemhe6xPr6CdkGDxvSL3GWsM5QNngVOSfvOTmBUN1hyphenhyphen6lo68jqwlnszay9PDAK95e4X4eXiNeZ4o/s320/cover.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZZrB27bSdcY9XVCZOTZumasXhUzmYjhCOZ3BBP5g-2JgWm6pQngUs8ThTphUN1xdOemhe6xPr6CdkGDxvSL3GWsM5QNngVOSfvOTmBUN1hyphenhyphen6lo68jqwlnszay9PDAK95e4X4eXiNeZ4o/s72-c/cover.jpg
TheWanTricks.com
https://www.thewantricks.com/2020/06/data-is-most-valuable-asset-how-to.html
https://www.thewantricks.com/
https://www.thewantricks.com/
https://www.thewantricks.com/2020/06/data-is-most-valuable-asset-how-to.html
true
8432683891110863063
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content