In the previous video, you launched a dictionary attack on yourself to see how many of the
passwords you created would be guessed by a hacker.
Even if very few of your passwords were guessed -- or none at all -- they still could be at
risk if a hacker was using a larger list of words, variations, and common personal identification
In this video, you will create secure passwords and learn how to keep them safe.
Secure passwords: Prevent someone from stealing your personal
information or money, Prevent unauthorized access to your accounts,
files, and devices, And keep your accounts, files, and devices safe.
Passwords should be at least eight characters long and a mix of uppercase and lowercase
letters, symbols, and numbers.
The longer the password, the more difficult it is for hackers to guess.
To create a secure password, begin by thinking of something that is memorable to you, but
difficult for someone else to guess.
You could use: the author or title of a favorite book,
a song or song lyric, a movie or actor you like
or a phrase that is meaningful to you.
For example, if you’re a fan of Shakespeare’s plays, you could choose Romeo and Juliet as
But, to make it secure, use a mix of uppercase and lowercase letters, symbols, and numbers.
Maybe you want to use a favorite song ... The name of a movie you enjoy ...
Or the first letters of a memorable saying such as, You can’t judge a book by its cover.
Decide which password strategy you want to use.
Once you have chosen a secure and memorable password, take important steps to keep it safe.
Do not share your password with anyone.
And never leave it written down at your computer or desk.
It can be difficult to remember unique passwords for many different accounts, but using the
same password for multiple accounts also puts them at risk of being hacked.
You might use a secure, trustworthy password manager to keep track of your passwords instead.
A password manager is an application that stores and manages passwords for a user’s
The passwords are protected by a single master password.
Another useful tool is two-step verification.
This system requires a user to have at least two different pieces of authentication at sign-in.
With two-step verification, you first sign in to your account with your password.
Then, you will be asked for a second form of verification.
It may be a code sent to your phone in a text message or a voice call.
Or, you could use a security key in your computer’s USB port.
Great work creating and protecting a password that will be very difficult for hackers to guess!
Now, it’s your turn: Think of something memorable to you that you
can use to create a secure password, And take steps to protect your new password.