Declaration

Why passwords?

Passwords are used to control access. They secure sensitive and protectable data, systems and programs.

You can compare a password to your front door key. With it, you control access to your house. In the same way, you use the “password” key to control access to sensitive data and procedures.

Where are passwords used?

Passwords are used when logging on to computers, networks or network drives. They protect resources such as files and information from unauthorized reading, writing, modification or deletion.

Passwords are also often used to protect access to individual programs. For example, only you can read your e-mail with your login name and password.

What does a secure password look like?

Your life partner’s name, your license plate number, your date of birth, or your phone number do not make good passwords. They could easily be guessed or deduced. Foreign words or words from another language are also not good choices, as they can be cracked by guessing using automated methods via dictionary or brute force attacks.

A secure password is at least eight characters long, if possible 12 characters, and consists of a combination of upper and lower case letters, numbers and special characters such as exclamation marks or question marks. As a general rule, the longer a password is, the more difficult it is to decrypt. In addition, letters that are directly next to each other on the keyboard should not be used. Ideally, the password should be unique. In addition, preset or newly issued passwords should be changed immediately upon receipt. In doing so, the new password must be significantly different from the old one. You should use a separate password for each service.