netCD.gif

networking curriculum
support CD for senior
secondary studies

Topics
. Home
. Networking History
. Why network?
. OSI model
. Connecting up
. Protocols
. Technology
. Network types
. Topologies
. Issues
. Design factors
. Economic effects
. www links
. Site map

Print Formattednetworking > issues > passwords

Passwords

One of the most common security methods is the use of passwords. Passwords are special "words" that allows access for a particular user or username.

There are a few precautions that users should practice when it comes to password use:

  • Make your password a combination of letters and numbers (some hacking software use a dictionary list of words to try to discover passwords).
  • Don't make it an obvious "word" eg your birth date, loved one's name etc.
  • Change your password regularly, say, every month.
  • Don't share your password with anyone!
  • Don't type in a password if someone else is watching you type.

Passwords should operate on a hierarchical basis so each user is allowed access to only the data they need to do their job. Managers and network administrators, for example, may have full rights to all data in the system. Data entry operators on the other hand may have full rights to the files they use but may have read-only rights to other files, and no rights at all for some other files.

worksheets
. history
. why network
. osi model
. connecting
. protocols
. technology
. topologies (tla)
. issues
. network types
. design
. economics
. economics (cs)
   - solutions -


quizzes
. why network
. osi model
. connecting
. protocols
. technology
. topology
. issues
. network types
. design
. economics


| Home | History | Why Network? | OSI Model | Connecting up | Protocols | Technology | Networks Types | Topologies | Issues | Design Factors | Economic effects |
:: copyright | credits | sitemap ::

© 2003 Victorian Information Technology Teachers Association
http://www.vitta.org.au/