Page 378 - IT 402 v2.0 class 10
P. 378
Threat Model: In a server, there can be many doors that can be intruded by a hacker. A threat model seeks
to identify these points in the server. It becomes more important in case a third party administrates the
server.
A threat model helps to assess the probability of attack, the potential harm, precautions can be taken to
minimise or eradicate the threats.
Auditing: There should be certain initiatives to check the website involved in e-Commerce. Organisation,
which does commercial transaction on Internet, should hire services from external auditors to check and
verify the authenticity of website and the operation of their systems.
Digital Signature: Digital signatures can be used to authenticate the generic use or to verify the integrity.
Digital signature is also known as ‘public key cryptography’, which employs an algorithm that uses two
different keys one for creating a digital signature or that transforms data into an unintelligible form while
data is transferred private key and for returning the message to its original form when data is at the
genuine recipient end public key .
IMPORTANCE OF SECURE PASSWORDS
When we use the resources of Internet, many process take place in our computer or on the line device, but
some of the actions can be risky as they create chance of theft or manipulations by hackers. As it is online,
it exposes us to the frauds and makes us sufferers unless we have taken the re uired steps to protect our
passwords or credentials.
ata security and privacy become utmost importance in this world when users are sharing confidential and
sensitive personal information while accessing web applications and online services.
Unauthorised access is a potential major problem for anyone who uses a computer or high-tech devices such
as smart phones or tablets. The consequences can include the loss of valuable data or information including
bank account information, money or even the complete identity. Moreover, unauthorised users may use
someone else’s computer to break the law and arise legal troubles.
strong password is one that is more secure by virtue of being di cult for a machine or a human to guess or
to unlock. Though advanced hacking and password breaking techniques can break into most user accounts but
a complex password means that any such attack is made di cult and time-taking to execute.
ritical and sensitive domains like banks and other financial intermediaries even use -factor authentication
techniques to protect the users which use OTP or one time pin along with the use of passwords to login to
the accounts.
A strong password is hard to guess, but it should be easy for the user to remember. Though the data stored by
the websites is generally encrypted with latest technologies but to keep it safe the first step should start with
the user itself. This implies that the users must ensure that they use a strong password which is not easy to be
guessed and hacked by anyone and can survive common hacking or breaking techniques.
Characteristics of Strong Passwords
A strong password is necessary to avoid unauthorised access to an account. Following are the characteristics
of strong passwords:
A combination of uppercase-lowercase words of ample length along with numbers and special characters
make a password complex.
376 Touchpad Information Technology-X

