Page 378 - IT 402 v2.0 class 10
P. 378

  Threat Model: In a server, there can be many doors that can be intruded by a hacker. A threat model seeks
           to identify these points in the server. It becomes more important in case a third party administrates the
           server.

          A threat model helps to assess the probability of attack, the potential harm, precautions can be taken to
           minimise or eradicate the threats.
          Auditing: There should be certain initiatives to check the website involved in e-Commerce. Organisation,
           which does commercial transaction on Internet, should hire services from external auditors to check and
           verify the authenticity of website and the operation of their systems.

          Digital Signature: Digital signatures can be used to authenticate the generic use or to verify the integrity.
           Digital signature is also known as ‘public key cryptography’, which employs an algorithm that uses two
           different keys  one for creating a digital signature or that transforms data into an unintelligible form while
           data is transferred  private key  and for returning the message to its original form when data is at the
           genuine recipient end  public key .

           IMPORTANCE OF SECURE PASSWORDS

        When we use the resources of Internet, many process take place in our computer or on the line device, but
        some of the actions can be risky as they create chance of theft or manipulations by hackers. As it is online,
        it exposes us to the frauds and makes us sufferers  unless we have taken the re uired steps to protect our
        passwords or credentials.
         ata security and privacy become utmost importance in this world when users are sharing confidential and
        sensitive personal information while accessing web applications and online services.
        Unauthorised access is a potential major problem for anyone who uses a computer or high-tech devices such
        as smart phones or tablets. The consequences can include the loss of valuable data or information including
        bank account information, money or even the complete identity. Moreover, unauthorised users may use
        someone else’s computer to break the law and arise legal troubles.

          strong password is one that is more secure by virtue of being di cult for a machine or a human to guess or
        to unlock. Though advanced hacking and password breaking techniques can break into most user accounts but
        a complex password means that any such attack is made di cult and time-taking to execute.
         ritical and sensitive domains like banks and other financial intermediaries even use  -factor authentication
        techniques to protect the users which use OTP or one time pin along with the use of passwords to login to
        the accounts.

        A strong password is hard to guess, but it should be easy for the user to remember. Though the data stored by
        the websites is generally encrypted with latest technologies  but to keep it safe  the first step should start with
        the user itself. This implies that the users must ensure that they use a strong password which is not easy to be
        guessed and hacked by anyone and can survive common hacking or breaking techniques.
        Characteristics of Strong Passwords

        A strong password is necessary to avoid unauthorised access to an account. Following are the characteristics
        of strong passwords:
          A combination of uppercase-lowercase words of ample length along with numbers and special characters
           make a password complex.






         376       Touchpad Information Technology-X
   373   374   375   376   377   378   379   380   381   382   383