TITLE

Field guide to passwords

PUB. DATE
July 2014
SOURCE
Consumer Reports;Jul2014, Vol. 79 Issue 7, p19
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers information on creating computer passwords that are complex enough to protect information but easy for the user to remember. Topics include warnings against simple number sequences or words as passwords as well as against using one's name and birthday, the disadvantages of highly complex passwords, and an example of a password using symbols within a phrase.
ACCESSION #
95992183

 

Related Articles

  • Password Security: An Analysis of Password Strengths and Vulnerabilities. Chanda, Katha // International Journal of Computer Network & Information Security;Jul2016, Vol. 8 Issue 7, p23 

    Passwords can be used to gain access to specific data, an account, a computer system or a protected space. A single user may have multiple accounts that are protected by passwords. Research shows that users tend to keep same or similar passwords for different accounts with little differences....

  • 'Tis the Season to Safeguard Your Identity.  // Chicago Citizen - South Suburban Edition;12/3/2014, Vol. 34 Issue 5, p4 

    The article offers suggestions on how to make the personal information secure while online shopping during holidays. Topic discussed includes preference of credit card while online shopping to avoid debit card fraud, need of vigilance while using public Wi-Fi specially when entering any...

  • Be Cyber Careful. Mathis, Diana // Utah Valley Magazine;Jan/Feb2016, Vol. 17 Issue 1, p94 

    The article offers several tips to prevent Internet fraud and identity theft. These tips include creating a complicated password as the most common type of identity fraud involves someone the victim knows, checking one's online statement and account activity regularly, and using the pascode lock...

  • UNDERSTANDING ONLINE AND OFFLINE CONSUMER BEHAVIOR: CONCEPTUALIZING FEAR OF ONLINE IDENTITY THEFT: A QUALITATIVE STUDY AND MODEL DEVELOPMENT. Hille, Patrick; Walsh, Gianfranco; Brach, Simon // AMA Summer Educators' Conference Proceedings;2011, Vol. 22, p214 

    The growing commercialization of the Internet is accompanied with a rise of e-commerce-related cybercrime. For carrying out online business transactions, consumers have to transfer their personal and financial data to companies or third parties (Forsythe et al. 2006; Morton 2006; Rust, Kannan,...

  • SECURING MULTIPLE DIGITAL IDENTITIES. Kutar, Maria; Griffiths, Marie; Fletcher, Gordon // ITNOW;Autumn2015, Vol. 57 Issue 3, p28 

    The article discusses the need of securing increased problem of multiple digital identities. Topics discussed include protection of personal data information and online identity, development of wearables and health-related application, and development of personal information management services....

  • “As a PC Pro reader, you can play your part in helping to spread the password manager message”. WINDER, DAVEY // PC Pro;Apr2020, Issue 306, p118 

    "As a PC Pro reader, you can play your part in helping to spread the password manager message" Even if you store truly unique and random, long and complex, passwords for every site and service in an encrypted password manager app, that doesn't mean your credentials are safe from attackers. Keep...

  • On IoT applications: a proposed SDP framework for MQTT. Refaey, A.; Sallam, A.; Shami, A. // Electronics Letters;10/31/2019, Vol. 55 Issue 22, p1201 

    In this work, the software-defined perimeter (SDP) is considered for the Message Queuing Telemetry Transport (MQTT) protocol framework in the Internet of Things (IoT) applications. In fact, the SDP provides an additional layer of security with or without SSL/TLS by replacing the traditional...

  • Poorly chosen user passwords constitute most common threat to network security. McClure, Stuart; Scambray, Joel // InfoWorld;10/25/99, Vol. 21 Issue 43, p60 

    Offers advice regarding the importance of well chosen passwords to network security. Four common sets of passwords; Sources of user names for NT systems; Guidelines that should be a part of any password policy.

  • Untitled.  // Micro Mart;8/22/2013, Issue 1274, p21 

    The article reminds consumers to ensure their gadgets including computers, tablets and smartphones are secured with passwords and other security features and have insurance coverage.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics