We have and use passwords to prevent others from accessing our devices and information. How do we approach using passwords? How can we be sure that our password is secure enough to achieve our objective of protecting information and other resources?
Let us first consider how we initially get our passwords:
The passwords we use will, in many cases, depend on the expectations of the service provider. Service providers can set the rules in terms of:
Remembering passwords for many different services is not easy. It is often tempting to use simple and perhaps common passwords.
According to Wikipedia (https://en.wikipedia.org/wiki/List_of_the_most_common_passwords Accessed 7 June 2018), the most common passwords used in north America and Europe include:
Also common, is the substitution of letters with numbers or symbols:
Using a common or simple password, it makes it easier for someone, or another automated system, to guess our password and gain access to our devices and our information.
It is also easier to have a single password that we may use for many services. While this is convenient, it does expose the risk that if the password is discovered on one service, access to your other services is then exposed.
For example, if someone discovered your password for Instagram, they may attempt to use the same username (or email address) and the discovered password to get in to your Facebook and email account. This could lead to access to confidential information, your contacts database and more. We can refer to this as a ‘spill over’ risk.