How Password Savvy Are You? - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23
Next How Password Savvy Are You?-9 Next

Answer: B – With the mnemonic method, explains NIST, “a user selects a phrase and extracts a letter of each word in the phrase (e.g., the first letter or second letter of each word), adding numbers or special characters or both … many mnemonic passwords are still susceptible to brute force guessing attacks. Common phrases converted into mnemonic passwords, without using unusual character substitutions or other alterations, can be guessed. Users that create mnemonic passwords should either avoid using common phrases, making up their own phrases instead, or should make significant unexpected changes to the passwords, such as changing capitalization and punctuation and spelling out one or more of the words.”

Passwords are often sought after by hackers because they are the gateway to data, systems and networks. Security breaches by hacktivist groups LulzSec and Anonymous often resulted in the release of passwords, which then provides the opportunity to snag other sensitive data like credit card information. 

Therefore, a strong knowledge of password management is important in keeping information secure. These 10 questions will test your password acumen.

After taking the quiz, you can find more information on password management on our site, including The Computer Guy’s PowerPoint on Protecting Your Passwords. In addition, our SMB Blogger Paul Mah has come up with five pointers about password management that all employees should know about. Remember, your efforts to secure your data may all be for naught if your end users don’t have the proper training.

More Slideshows:

A Step-by-step Guide for Getting a Job in 30 Days Ten solid tips for finding a job in a month.

Prepare for Canada's Anti-spam Law with Email Best Practices Tips to help organizations practice permission-based marketing and prepare for compliance with Canada's new anti-spam legislation.

Promising New Tablets New tablets that are looking to compete with the iPad.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

IT_Man88-190x128 Top 5 Trends Affecting Women-Owned Micro Businesses

Learn more about the challenges and opportunities presented to women leaders, especially micro-business owners. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.