Email Subscription

header ads

Computer Security: How to protect password from hackers

out of Box Knowledge!!!

Computer Security 

Computer security deals with protecting various resources and information of a computer system against destruction and unauthorized access. It involves both external and internal security. External security deals with securing a computer system against external factors such as fires, floods, earthquakes, stolen disks/tapes, leaking out of stored information by a person who has access to information, etc. The commonly used methods for external security include maintaining backup copies of stored information at places far away from original information, using security guards to allow entry of authorized person only into computer centers, allowing access to sensitive information to trusted employees/users only, etc.   

Computer Security is the field which tries to keep computers safe and secure. Security means allowing things you do want, while stopping things you don't want from happening. Parts of this include authentication and validation (making sure you are who you claim to be), encryption (making sure data gets where you want to go, without others being able to observe it) and physical security.

Computer Security: How to protect password from hackers



Internal security, on the other hand, mainly deals with following aspects:

  1. User authentication. Once a user is allowed physical access to a computer, the computer must check the user's identification before allowing the user to use it. User authentication mechanisms take care of this requirement. Passwords used for logging into a computer, electronic cards used in bank ATMs, and bio-metric devices that verify some unique physical characteristic of a user (such as fingerprint, face appearance, voice, hand geometry, etc.) are some commonly used user authentication mechanisms.
  2. Access control.  Often, many users share a computer system, which contains many resources and several types of information. Obviously, not all resources and information of the computer system are meant for all users. Therefore, even when a user passes user authentication phase and is allowed to use a computer, the system needs to have some mechanism to restrict the user's access to those resources/information that he/she is authorized to access. Access control mechanisms take care of this requirement. Operating systems normally maintain Access Control Lists ACLs) to implement access control. ACLs specify which users can have what types of accesses on various system resources.
  3. Cryptography. Even if a user somehow manages to gain access to some information that he/she is not authorized to access, the system needs to have some mechanism to ensure that the user cannot make use of that information. Cryptography mechanisms take care of this requirement. They work on the idea of encrypting a piece of information to prevent its comprehension by unauthorized users. Authorized users only can have the necessary key to decry-pt encrypted information.

How to protect password from hackers

Computer Security: How to protect password from hackers

  1. Use strong and long passwords: 'password', '123456' 'abc123' are terrible password because they are easy to guess, One way to build a strong password is to think of a phrase or sentence that other people wouldn't know and then use that to build your password for example thing of a personal message like and then build your password. 'Hi to your dear' like %P!m85k9*R.
  2. When entering your password, be aware of your surroundings. Make sure no one is watching. And give others a little privacy when they're typing their own passwords. It's just as important to protect yourself by never having access to someone else’s password. You don't want that liability. 
  3. Secure your passwords: Just like you wouldn't use the same key for your home car and office, you should never use the same password across different website. Some we sites allow you to add an extra layer of security to your account by enabling a one-time password. Often referred to as on 'OTP' this will require you to enter another 'Key' or code to unlock your account in addition to your password.
  4. Recall value: Once you've created a strong password for each of your online accounts. it can be challenges to remember them all. So consider using a trusted password manager that encrypts are save your passwords and can be accessed with a single password and an OTP- One time password.
  5. Check your settings: Social networking sites allow you to share photo videos, status updates and much more. many of these services offer privacy setting and controls that help you decide who can see your content before you post it. Do not share too much personal information on social networking sites.
  6. When managing your business social media channels or doing work in general, ALWAYS use a private Wi-Fi network. Private Wi-Fi systems are always password protected. Most small businesses nowadays invest in their own Wi-Fi to have that extra layer of security.
  7. Phone business: sometime you can also add a phone number to your profile to receive a code to reset you password via SMS. Your mobile phone is more secure identification method then your recovery email address or security question because, unlike the other two, you have physical possession of your mobile phone.
  8. Update your recovery options: If your do forget you Password or get locked out, you need a way to get back into your account. many services will send an email to you at a recovery email address if you need to reset you password. So it's important to make sure your recovery email address is up-to date and is linked to an account your can still access.
  9. link your email id in your net banking account. And most important set security question for your bank account. Change your net banking password in 3 months.
  10. Dictionary attack: In a dictionary attack, a computer uses a word-list (like maybe the entire English dictionary) to try and find a password that works. The computer will simply plug in every word in its word list in an attempt to find a working password.
    So we recommend that you avoid using a single word from the dictionary as your password. You should also avoid using any commonly used word or name that might not be in the dictionary. 

I Hope you like this article Thanks for read this article. 
Please share this article to your friends and family members..
subscribe to our blog for more articles...

Post a Comment

1 Comments

  1. Hello all
    am looking few years that some guys comes into the market
    they called themselves hacker, carder or spammer they rip the
    peoples with different ways and it’s a badly impact to real hacker
    now situation is that peoples doesn’t believe that real hackers and carder scammer exists.
    Anyone want to make deal with me any type am available but first
    I‘ll show the proof that am real then make a deal like

    Available Services

    ..Wire Bank Transfer all over the world

    ..Western Union Transfer all over the world

    ..Credit Cards (USA, UK, AUS, CAN, NZ)

    ..School Grade upgrade / remove Records

    ..Spamming Tool

    ..keyloggers / rats

    ..Social Media recovery

    .. Teaching Hacking / spamming / carding (1/2 hours course)

    discount for re-seller

    Contact: 24/7

    fixitrogers@gmail.com

    ReplyDelete

For More Information Please Comment