What are some of the characteristics of weak passwords?

What will be an ideal response?


Characteristics of weak passwords include:
* A common word used as a password (such as "Christmas")-Attackers can use an electronic dictionary of common words to match the password.
* Not changing passwords unless forced to do so-An attacker would have unlimited access to the user's account for the foreseeable future.
* Passwords that are short (such as WXYZ)-Short passwords are easier to break than long passwords.
* Personal information in a password (such as the name of a pet)-These passwords are easy to identify.
* Using the same password for all accounts-Once the attacker has one password he can gain access to any computer or account this person uses.
* Writing the password down-This serves as an open invitation to break into the account.

Computer Science & Information Technology

You might also like to view...

Continuing with the example of the Election service, explain why the part of the WSDL is referred to as ‘abstract’. What would need to be added to the service description to make it completely concrete?

What will be an ideal response?

Computer Science & Information Technology

Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?

A. wireless B. access C. link D. ad hoc

Computer Science & Information Technology

The ________ identifies patterns and colors assigned to categories in the chart

A) data series B) legend C) data point D) chart sheet

Computer Science & Information Technology

Form templates are applied to form libraries and are used to collect data stored in the library

Indicate whether the statement is true or false

Computer Science & Information Technology