Skip to main content

 

Password policies and importance of data Encryption.

what is a password?

A password is a secret word or phrase that must be used to gain admission to a place. A Password is a word, phrase, or string of characters intended to differentiate an authorized user or process for the purpose of permitting access, from an unauthorized user or put another way a password is used to prove one's identity or authorize access to a resource.

 

Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services.

An ideal password must satisfy two conflicting aims. It should be:

·        memorable enough that the user can recall it without writing it down

·        long enough and unique enough that no one else can guess it.

 

How to create a strong password

Using easy guessable passwords like your pet’s name or your street name is not ideal yes it is easy to remember but it is also easy to be guest. To create a strong password, you will need to think about a few things like it needs to be easy enough to remember but hard enough for someone yes. I think the best way to do this is to think of a phrase for example something like “kill2birdswith1stone!”. Add a numbers and special characters for only strengthening the password another thing to remember is long at the password/ phrase the harder it is to crack. I could password should have eight or more letters and contain upper- and lower-case letters, least one number under special character. You should not give out your password to anyone, everyone should have their own unique username and password then must not be shared.

 

On the other hand, if you enter your account password incorrectly more than once. You may also have problems with your account. For example, the account is automatically locked and asked to set a new password, which also prevents criminals from cracker your password. Furthermore, some advanced computer systems or accounts require users to use passwords that cannot exceed a certain date. If the date is exceeded, the user will be required to change the password, which can also prevent the password from being cracked and the loss of personal information.

Here is the results of the password I created call also leave the link I used to show me the results please feel free to have a go yourself.




Importance of data Encryption


What is data Encryption.

 

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.

These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

 

How does encryption work?

Encryption is the process of taking plain text, like a text message or email, and scrambling it into an unreadable format called cipher text. This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.

When the intended recipient accesses the message, the information is translated back to its original form. This is called decryption.

To unlock the message, both the sender and the recipient have to use a secret encryption key  a collection of algorithms that scramble and unscramble data back to a readable format.

 

An example of encrypted data website would be protonmail, ProtonMail is an easy webmail service that protects your message archive with zero-access encryption and offers end-to-end encryption for message transmission. I will  also leave a link to the website if you would like to join up. https://account.protonmail.com/login


Comments

Popular posts from this blog

Jesse Lingard home workouts!!!

Manchester United star Jesse Lingard is posting on his social media free work out you can do at home. Manchester United midfielder Jesse Lingard’s 40-minute workout consists of three rounds of four sets of exercises, including cardio, core and overall strength, with a bonus round if you can hack it! His work as follows --  First set no breaks in between  High knees --30 Seconds Bur-pees --30 seconds Mountain climb -- 30 seconds Alternate lunges -- 30 seconds  1 minute rest Second set no breaks in between Sit ups -- x10 Elbows to knees -- x10 Touch heels -- x10 Scissors -- x10 Touch toes -- x10  1 minute rest Third sets no breaks in between   Press up -- 8 to 1 Press up to plank -- x10 Plank left / right -- 30 seconds  1 minute rest Forth sets no breaks in between  Wall sit / squat -- 30 seconds  Revers Lungs -- x10 Jump squats -- x10  Walk on...
Data security firewall  What is a firewall? A firewall is network security device or software that monitors incoming and outgoing network traffic, it permits, or blocks network traffic data packets based on a set of security rules . The purpose of the firewall is filter out any malicious traffic like viruses and hackers and tonight access to the viruses and hackers, and it will allow safe network traffic through such as the Internet. By default, a firewall blocks all network traffic coming into the network it is protecting.  For the campus firewall this means that no traffic from the Internet can get on the Missouri State campus network without explicit permission.  To permit traffic through the firewall we create exceptions or rules that allow certain traffic on the network.  The rules are defined by the IP addresses of the sender and receiver of the traffic as well as the type of traffic e.g. web or SSH.  Types of firewalls Firewalls can either be soft...
  Data security week 6 blog Configuration of firewall and I had to keep your device safe using firewall There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have   annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked. By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode: High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and c...