A password is a means of proving to a computer system that you are who you say you are. This page provides advice on how to choose a good password and keep it safe.
Most computer systems require two pieces of information before you can gain access: your username, which tells the computer who you are, and your password -- a collection of keyboard characters known only to you.
This method is designed to prevent people from gaining access to your data, using your print credits, sending email in your name, or using your computer to mount illegal attacks over the Internet.
It is very important that you do not tell anyone your password. If someone finds out what your password is, you should change it as soon as possible.
Information Services will NEVER ask you for your password and you should NEVER share it.
A good password is at least eight characters long, with a mixture of alphabetic, numeric and punctuation characters. It should be easy to remember -- at least for you -- but difficult to guess. Here are a few guidelines.
One technique for generating passwords is to start with a phrase or sentence which you can remember (and which can't be guessed by those who know you), then to convert it to letters, numbers and characters in some easy to remember way.
For example use the initial letters of "I'm In Love With A German Filmstar" to generate a password of 'IilwaGf*'.
Please don't use this example -- think up one for yourself!
You might not be storing vital information in your account, but if a malicious person breaks in to it, they could delete all your files (including vital setup files) and your mail. They can also send mail to people in your name, normally without good intent, print using your quota or cause other damage. Make sure you use a different password for different things: if one password is compromised you can limit the damage if you use different passwords for EASE, VPN and internet banking etc.
It is part of the Computing Regulations of the University that users are required to take all reasonable precautions to maintain the integrity of their passwords and any other security mechanisms. All users are bound by these Regulations.
This article was published on Nov 28, 2012