Keep Computers & Information Safe
There are many resources on the Internet. Here are links to tools and sites that will help you analyze risks, take preventative measures, and protect your environment.
Choosing Good Passwords
Many technology security groups estimate that 40-50% of those people with electronic identities will have them stolen this year. Most of the victims will not even realize it until it is far too late. Therefore, to help prevent your Old Dominion (MIDAS) electronic identity from being stolen, strong password requirements are being enforced. Here are some tips to help you create strong, secure passwords.
Passwords Should Not
- be an alphabetic series either forwards or backwards, i.e., ABCDEF or FEDCBA.
- be a numeric series, either forwards or backwards, i.e., 123456 or 654321.
- be a string of all identical letters or numbers, i.e., AAAAAA or 111111.
- be a common keyboard shortcut, i.e., ASDFG or QWERTY.
- be your name or userid, or any variation thereof, such as your name or userid spelled backwards, with mixed case letters, etc.
- be a word(s) that can be easily associated with you, such as the name of your spouse, child, pet, favorite football team, or literary character.
- be a common word that you might find in a dictionary.
- Creating a password that is at least eight characters long.
- Combining the first letters of each word of a phrase to produce the password .
- Including at least one symbol or number in the password, but preferably not just one at the end.
- Using a varying combination of lower and upper case letters in the password.
Maintaining Password Security
- Using different passwords on each account you have.
- Changing your passwords at regular intervals.
- Never writing your passwords down.
- Never sharing your password with others.
Computer Security Advice and Procedures
Websites of Interest:
Choose your operating system for procedures and checklists on securing that system:
- Microsoft Security page - information on the latest exposures, risks, and system updates
- Securing Microsoft Windows 2000 Professional by Marc DeBonis
- Solaris Operating Environment Security Document
- Security Configuration Guides from the National Security Agency
- Benchmark and Securit y Tools from The Center for Internet Security - includes benchmarks for Cisco Routers, Solaris, Windows 2000 and NT, Linux, HPUX, AIX
Information on availiable firewalls: