Tips for Designing Password Protected Software or Systems
There are any number of methods that can be utilized to enhance the security of password
protected software and systems. One of the most common techniques is to obscure the entry
of such passwords. A popular method is to not allow the onscreen display of password characters,
but rather to show an asterisk resulting from each keystroke. This presents a formidable challenge
to "shoulder surfers" who attempt to view your monitor.
Another good idea is to require a password of a minimum length incorporating letters and
numerals. We recommend a length of at least ten characters. Unfortunately most Unix systems
limit passwords to eight characters, so if this is the developmental platform other methods
must be utilized.
Many administrators require periodic password changes, such as every 30 days. There are
instances, in high security fields, where this time could range from days to hours. Periodic
password changes severely limit the usefulness of stolen or compromised passwords.
Some IT departments distribute randomly assigned passwords. This is an excellent idea in that
it ensures compliance with an established password policy. This allows for strong, secure
passwords with a limited life cycle.
Remember- you can use
CyberScrub KeyChain Password Manager
to manage your passwords. KeyChain Password Manager will remember your log in details for each
website and automatically fill in the user name and password log in fields.