Skip to main content

 

Password policies and importance of data Encryption.

what is a password?

A password is a secret word or phrase that must be used to gain admission to a place. A Password is a word, phrase, or string of characters intended to differentiate an authorized user or process for the purpose of permitting access, from an unauthorized user or put another way a password is used to prove one's identity or authorize access to a resource.

 

Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services.

An ideal password must satisfy two conflicting aims. It should be:

·        memorable enough that the user can recall it without writing it down

·        long enough and unique enough that no one else can guess it.

 

How to create a strong password

Using easy guessable passwords like your pet’s name or your street name is not ideal yes it is easy to remember but it is also easy to be guest. To create a strong password, you will need to think about a few things like it needs to be easy enough to remember but hard enough for someone yes. I think the best way to do this is to think of a phrase for example something like “kill2birdswith1stone!”. Add a numbers and special characters for only strengthening the password another thing to remember is long at the password/ phrase the harder it is to crack. I could password should have eight or more letters and contain upper- and lower-case letters, least one number under special character. You should not give out your password to anyone, everyone should have their own unique username and password then must not be shared.

 

On the other hand, if you enter your account password incorrectly more than once. You may also have problems with your account. For example, the account is automatically locked and asked to set a new password, which also prevents criminals from cracker your password. Furthermore, some advanced computer systems or accounts require users to use passwords that cannot exceed a certain date. If the date is exceeded, the user will be required to change the password, which can also prevent the password from being cracked and the loss of personal information.

Here is the results of the password I created call also leave the link I used to show me the results please feel free to have a go yourself.




Importance of data Encryption


What is data Encryption.

 

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.

These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

 

How does encryption work?

Encryption is the process of taking plain text, like a text message or email, and scrambling it into an unreadable format called cipher text. This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.

When the intended recipient accesses the message, the information is translated back to its original form. This is called decryption.

To unlock the message, both the sender and the recipient have to use a secret encryption key  a collection of algorithms that scramble and unscramble data back to a readable format.

 

An example of encrypted data website would be protonmail, ProtonMail is an easy webmail service that protects your message archive with zero-access encryption and offers end-to-end encryption for message transmission. I will  also leave a link to the website if you would like to join up. https://account.protonmail.com/login


Comments

Popular posts from this blog

VADDAL RILEY HOME WORKOUT IN LOCKDOWN!!!

Viddal Riley is a up and coming boxer, he has had 4 professional fight and has won all 4 fights, he also fought in the under card of  Manny Pacquiao in Las Vagas on the 28/02/2020 leading the only KO of that night. Viddal also has a Youtube  channel where he posts quite frequently. He post about Boxing, Coaching, Music and challenges if you want to check it out here it is  https://www.youtube.com/channel/UC9BaJIXnYSyYalbCVfZTZ4A . He has put out a video on a home work out that you can do in the lock down here it is -- Warm up -- 5 mins Skipping at your own level Double jump skipping High knees skipping Ground work -- Sit ups -- x12 Dorsal Raise -- x12 Pike Sit Ups -- x12 Bur-pee Stand Ups -- x12 Thumb Touching Push Ups -- x12 Pike Sit Ups Alternative Legs -- x12  Squat Thrust -- x12 Abdominal Hold -- 25 secs Bur-pee Jumps -- x12 Finger Tip Push Ups -- x12 Elbow To Knee Sit Ups -- x12  Rest Warn Down Done! Here is the link if you need a demonstration :--   h
  Data security week 6 blog Configuration of firewall and I had to keep your device safe using firewall There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have   annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked. By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode: High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and co
  Data security week 7 blog   Why is Backups important   The purpose of the backup is to create a copy of data that can be recovered in the event of a system failure. System failures can be the result of hardware or software failure, data corruption, a malicious attack (virus or malware), or accidental deletion of data. Backup copies allow data to be restored  would provide the means of restoring to a previous point after the incident has been dealt with. Backups is a vital method of storing data and keeping it safe, when you take your time and set up a good backup strategy you can ensure that data can easily be recovered. Storing copies of data on a separate device for example USB stick, an external hard drive, A disk ah storage system, cloud storage or tape drive   can protect you against data loss or corruption. most of these devices need to be at the location of your PC or laptop When trying to restore but you can store the devices in a safe place until you need it of you