


Typically, this might be something that the user knows, owns or something that definitely belongs to them. Two factor authentication (2FA) is used to prove a user’s identity through a combination of two different and, in particular, independent components (factors). Under no circumstances should you list out all your passwords in a place where they can be accessed Don’t save your passwords on the networkįor example on Intranet pages or in SharePoints Create secure passwordsĪ password should be at least eight characters long and include letters, numbers and special characters as well as upper and lower case letters 2-factor authentication You should change your password immediately if you suspect that an unauthorised third party has gained knowledge of it Never write down your passwords

Protect yourself by changing your passwords at regular intervals Do not disclose your passwords to other peopleĪnd don’t use other people’s passwords either Change your password immediately if you suspect that your password has been disclosed An ethical hacker finds the weak points or loopholes in a computer, web applications or network and reports them to the organization. Ethical hacking is to scan vulnerabilities and to find potential threats on a computer or networks. Create different passwords for email accounts, online banking, etc. &0183 &32 Ethical hacking: To crack passwords or to steal data No, it is much more than that.
