Managing information on computersUser accounts and passwords

Using computers and the internet to store, access and organise information carries some risk. You need to take responsibility to make sure files are not lost, corrupted or viewed by the wrong person.

Part ofICTSoftware

User accounts and passwords

All of your , and are stored in your . You can your user account to prevent other people from accessing its contents. Your username is commonly based on your name and you usually get to choose your own password.

To access your user account, enter your username and password into the . Sometimes the username is selectable or entered for you, especially if you were the last user to login to the machine.

A user name and secure password login protect a computer
Figure caption,
A user account is usually password protected

Passwords can be set to expire, at which point you will be forced to choose a new one. This is a security feature. Always choose a password that’s difficult for someone else to guess.

Choosing a password

A strong password is:

  • at least eight characters long
  • a mixture of numbers, uppercase and lowercase letters and other symbols, eg !@#£$
  • not a real word
  • impossible to guess

A weak password might be:

  • the word ‘password’
  • your favourite colour/favourite football team/pet’s name
  • a single letter
An graphic showing the importance of choosing a strong password by choosing characters, numbers and symbols.
Figure caption,
It's important to choose a strong password for security

Stealing a password

The word ‘cracking’ is used to describe the process of obtaining a password by force. use programs that use brute force and dictionary attacks to crack passwords.

  • A brute force attack tries every combination of letters, numbers and symbols until it identifies the password.
  • A dictionary attack behaves in the same way but uses a list of words instead.

Do not write your passwords down and use a different password for each of your accounts. If you use the same password, a hacker that gains access to one of your accounts will have access to all of them.