Page 396 - IT 402 v2.0 class 10
P. 396
Install Firewall
Firewall could be either a software or hardware that helps in keeping a network secure. It analyses the network
tra c flow of data and determines whether the tra c should be allowed or not in the network. In most
cases operating systems such as inux indows or Mac include firewall software as a part of operating
system thus keeping a computer secure but in some cases a user needs to configure firewall in the network
for additional security.
Never Install Software From Unknown Sources
efore downloading and installing a software verify the source of supplier to find whether it is legitimate or
not by searching the Internet or referring to review of the other users. A user should understand the nature,
the purpose and given terms of the software before attempting to download and install it.
ata Stored in We ro sers
Web browsers have built-in password management system that helps to store passwords while browsing
or opening an e-mail. It often prompt to save user names and passwords when users attempt to login. This
facility is offered to the users so that they can login to their fre uently used websites or e-mail accounts
without having to type the usernames or passwords time and again. However, it is not advisable to store such
data on public or on shared computers, else any other user can open the website or e-mail.
Password
password can be termed as a key of codes that protects our valuable contents documents or files. It helps
us to keep many of our belongings or documents secure or secret. We can safeguard our belongings by
restricting their access to others through locks that can be opened only through password. For example if we
are traveling with luggage in a public transport like a bus, train or aeroplane, we can ensure that our luggage
is not opened by any other person by securing the luggage with the lock that can open only with a secret
code or password.
We keep our important documents in a safe cupboard and lock it up with a key so that they do not get
accessed by people whom we do not trust. Similarly in a computer we set a password as key so that our
documents or files that are stored remain safe or secret.
asswords authenticate or enable a person to access or operate a computer network resource internet
e-mail, bank account, etc. Whether it is banking, online shopping, checking of e-mails or use of social media,
people have to make use of passwords.
Ideally, a password is a combination of alphabets, numbers and special characters that are not easily guessable
by others.
ips for keeping non-guessable passwords:
Keep the length of the password of at least 8 characters, including a combination of numbers and symbols.
void keeping passwords based on repetition letters or number se uences.
Use a combination of uppercase and lowercase.
Avoid using the same password for multiple purposes.
Avoid using something about yourself that is publicly known to others.
Avoid keeping names of loved ones, relatives, friends etc. as passwords.
394 Touchpad Information Technology-X

