Is the computer science security, a subject that sounds to roll truth to us? although he would have to worry to us much and, being prot©g©s in ours to happen daily in the digital world. Normally we did not take the necessary measures, for several reasons: ignorance, lack of time, etc but are very necessary that we take brings back to consciousness of this subject. To fix to you, some ago days, algun@de vosotr@s called to me so that it helped him in a case of kidnapping of password in a mail account. So I have been decided to tell a little you about the use of the passwords.
When you study computer science security, by where they begin to explain to you, is the securing of systems, and the first measures of which they speak to you to protect them, and to really protect the access nonwished to information, is the correct use of the passwords. We used them on a daily basis, in the mobile phone, our accounts of access to the social networks, for the access to banking data, when we are going to look at our mail (gmail, hotmail, outlook,), etc etc. But.we used them correctly?
Next, I am going to ask some questions to you; they reflect envelope and you will realize if you use this small part of the computer science security, since she must become; that is to say, if you use safe passwords.
- Is your password secret? .or you have shelp it to somebody at some time?
- You know that it is a robust password and you put it in practice for yours?
- You use a different password for each social network, e-mail, or programs/platform that you use so much in the computer as in the movable device?
- And to finalize you change your password periodically?
If you are of that they consider these four questions and you put them in practice, you are using safe passwords; if no, although normally you use three of the four points, you are not using safe passwords, and you are creating a vulnerability in your systems or what is the same, you will be leaving doors so that somebody that it controls (and there is much people, but much) no longer only it accedes to your deprived information, but it kidnaps your system, and bad it passes. Example of this, is the programs of type ransomware.
THE PASSWORD HAS TO BE SECRET
You do not trust your password to anybody, nor to your pair; and in addition, it educates to the people who surround you in that sense, will thank for it to you. If you need that somebody accedes to your information, compartela otherwise, ponla in a FTP, some service Web, etc etc; and if one is that you want to teach, introduces you, your password, so that they accede to your information, or but, it uses a temporary password that does not matter that to these relatives or friendly know to you, but you never say your real password.
One says that a password is robust, when it follows the following parameters in his composition:
A robust password has to have a minimum length of 8 characters; recommendable 10-11; and that is compound of capital letters, small letters, numbers and special characters (@$%#.).
This is so important, that so that you DES one devises, if you use a password of 8 characters since I have explained to you, a program for desencriptaci³n of passwords, will take about 200 years in descrifrarla; if on the contrary you use it of 8 characters, but only with very small letters, it would take about 2 days in doing it. There are designed software to prove passwords, million of them per minute!
You never use phrases, names or dates that are related to you easily; it uses mnemonic rules to compose these passwords.
THE PASSWORD HAS TO BE UNIQUE
You do not use the same password to accede to different Webs, programs or services, have to be different!
Slight roll no? .if you the takings thus, will be it, but it remembers that you are protecting to you.
It uses part of the password as matrix to compose several, but whenever they keep the criteria from robustness that commented you in the previous point. Mnemonic rules exist to remember them.use them!
Eye with the questions to recover the passwords in certain websites; they can be a weapon of double edge in ours against. If we used easy questions or we give answers easy to guess, whatever it knew us could harm this step and accede to our information or the change of the password!
He is advisable to use programs of management of the passwords, as for example this. Use them!
PERIODIC CHANGE OF PASSWORDS
In order to finalize, a last very important question and. The periodic change of the password. You do not stop using this I complete point, the change of the password every month or at the most month and a half. He is vitally important!
In order to finalize, to comment something to you that you perhaps do not know:
They exist programs as sniffers, that are designed to monitor the traffic of the network, to detect vulnerabilities, and that are used in the departments of organism and companies security of, to correct the detected holes, in the security of its systems, but are also used by many people of malicious form, as for example, to extract your passwords when you are acceding to social mail, networks, etc etc. Consequently, is vital that you at least respect these points that I finish to you explaining, and, will be assuring a very basic and important part in your digital systems.