Argumentative Essay: Is There A Right Password?

Improved Essays
Is There a Right Password Years ago people use to worry about their homes been burglarized or getting robbed in the store by pick pockets, but, today that is not the case. With the rapid growth of technology every day, cybercrime has taken over from pick pockets and burglars. “crimes conducted via the internet or some other computer” (Evans, Kendall and Poatsy). With all the dilemmas that the society has to deal with, creating a secure password to protect our personal information from cyber hackers can be very overwhelming.
Before it wasn’t so complicated to create a password, but, since then the requirements for a stronger password is special characters that can’t be used more than three times such as;&,@,!,digits, at least eight characters with upper and lowercase letters and should not be in the dictionary. . Base on a video that I watch on ted.com about password presented by Lorrie Faith Cranor a computer science professor and
…show more content…
• 80% states that they reuse their password because of being annoyed; this is considered more dangerous than writing it down.
During their researcher they found out that hackers were stealing password and unscrambling them through a hash function .first letters were used and it didn’t work they would try to use popular name such as Jane, Betty, Mike etc. All this information was gathered from a job site they’ve created “Amazon Mechanical Turk” the goal to this jog site was to hack into the system with the passwords that was created by students. It was concluded that there is no strong measurement for passwords that hackers can’t unscramble and the safest thing to do is to use long and complex passwords with special characters or

Related Documents

  • Decent Essays

    A strong password would be a password with at least 12 characters, the more characters you have the less the chance of getting your account stolen. 3. Give examples of computer crime and cyber crime that illustrate…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Password we set before controls only your login and access to your account. And all of the files on the computer are written to the hard drive. Password doesn’t save you from someone who can get physical access to the hard drive of your computer by connecting your mac to another machine or removing the…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Petty Theft: Joe walks into a well-established electronics store. He walks around for a while, then decides to take a few inexpensive electronics without paying for them. He ends up stealing about $200 worth of items. The theft is documented on the security camera and Joe is caught. He is charged with petty theft, which is a misdemeanor and can result in up to a year in jail.…

    • 761 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Winnit wanted to put up a statue to show his religion, but he put it right in front of another religious statue. Official take it down thus making Winnit mad, so he files a lawsuit demanding to put it back up. The District court ruled in favor of the officials saying that it wasn’t a violation of freedom of exercise of religion, and if the troll was kept would act as government speech, which is a violation of the First Amendment. The 4th U.S. Circuit Court of Appeals disagreed with both the District and eventually the Supreme Court. I have a dissenting opinion with the majority with the Supreme Court.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Ever tossed a penny aside and never gave a second thought about its worth? What many Americans fail to realize is the price they pay for each discarded, unwanted penny. I believe that the penny should be eliminated from American currency because they cost too much, waste valuable work time, and have been erased in other countries with no terrible consequences. The penny is surely not worth the trouble it causes and the burdens we have to endure by keeping them. Pennies are worth one cent, but producing pennies can cost even more than double that price.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Since the beginning of time, achieving success has always been a group effort. Whether it be building the Pyramids or the White House, nothing over the course of history has ever been completed by one person alone. There is always help, whether it be in the form of someone acting on another individual's behalf or supporting someone by sharing advice or lending an encouraging word. Into The Wild by Jon Krakauer is a work that reveals the tendency of people to fail at helping and supporting unique or unordinary individuals find a way to fit into a materialistic society that seemingly contradicts everything they stand for. It is through analyzing the reasons why Chris McCandless goes into the wild that we see the importance of having a support group and finding people to hold yourself accountable to.…

    • 717 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Into the Wild Argumentative Essay Christopher McCandless stated “The very basic core of a man’s living spirit is his passion for adventure, the joy of life comes from our encounters with new experiences.” Chris McCandless had been a very spontaneous person in his time of living. McCandless always did things the way he wanted to do them. He was an independent person who did courageous things. McCandless never let people get him down, because he knew the things he did were gonna be fascinating to tell one day.…

    • 873 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    What’s on Your Label? Eleven year old Derek Wood of Sterritt, Alabama, went grocery shopping with his mother, Cline, at a local store. They picked up essential items and stopped by the bakery that had desserts such as cookies. Later that evening, Cline took a bite of the cookie, saw there were no nuts, and gave the rest to her son, Derek.…

    • 2233 Words
    • 9 Pages
    Improved Essays
  • Superior Essays

    Hungry for Change Why is it that law mandates public school meals have a minimum calorie intake, but not a maximum? This owes itself to the fact that when nutrition standards were established for public schools, it was to solve the problem of undernourishment. The majority of school aged children used to walk to school, played more outside, and were more active in sports. This resulted in children burning more calories than school meals provided.…

    • 1157 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    But above all else, remember that merely using encryption does not make someone a dangerous criminal. Even if you don’t know it, you benefit from encryption every day. Your right to privacy should not be violated just because other people are doing something…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Proper password security Passwords are is a convenient method of authentication the way it works is the system requires someone to enter a piece of information and then match it to the one that the system has if the information is correct the user will be able to access the system but there is some disadvantages of this some people may try to gain your password by looking over your shoulder or a brute force attack which implies that the person trying to require your password will try to maybe use a program that will automatically enter numbers and letters to try match it so some companies will have a method to prevent this for example they give you a certain number of tries to enter the password so this means that the person who entering the password will get a certain amount of tries this will prevent programs from searching for your password there is also the fact that you might have to type in more than one piece of information to gain access so this could be a password plus a security question that only you would…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    “What could it be?” I wondered, my 7 year old hands furiously typing on the keyboard. I had spent the course of several month putting in every password I could think to guess. Why I was doing all of this? To have unlimited access to video games, of course.…

    • 822 Words
    • 4 Pages
    Great Essays