Definition

strong password

A strong password is one that is designed to be hard for a person or program to discover. Because the purpose of a password is to ensure that only authorized users can access resources, a password that is easy to guess is a security risk. Essential components of a strong password include sufficient length and a mix of character types. A typical weak password is short and consists solely of letters in a single case.

When people create passwords, they often defeat the purpose by choosing parts of their names, the names of their pets, or even the word "password," itself, which was the most commonly used password for many years. Now that many password policies require the inclusion of a numeral, the most common password is "password1."

You can make your password much harder to break by using more characters, mixing upper and lower case letters, and including numbers and special characters. According to a security guide from Texas A&M University's Research Foundation, a six-character, single-case password has 308 million possible combinations, all of which a password cracker can go through in just a few minutes. Combining upper and lower case letters and using eight characters instead of six increases the possible combinations to 53 trillion; substituting a number for one of the letters yields 218 trillion possibilities; and substituting a special character or punctuation for another yields 6,095 trillion possible combinations. Although a password cracker can eventually go through that many combinations, it requires much more time and computing power.

People like to use passwords that will be easy for them to remember. A Microsoft article about security suggests that you use a memorable phrase instead of a word, and convert that phrase to a password. For example, the phrase, "I have 2 Labrador retrievers! Fido and Spot." could be expressed as Ih2Lr!F+S.

Contributor(s): Princy Mehta
This was last updated in September 2005
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Enterprise desktop tutorials

    SearchEnterpriseDesktop.com’s tutorials provide IT professionals with the latest information on implementing, managing and securing Microsoft Windows desktops including Windows Vista, Windows XP, desktop security, desktop virtualization, terminal services, application streaming, software as a service and more.

  • What USMT will and won't do

    Microsoft's User State Migration Tool does have limitations. See what it can and can't do.

  • How to handle your Vista migration

    Now that Microsoft has stopped selling Windows XP, many companies are considering whether or not to upgrade to Windows Vista. While Vista is not without its problems, many of the operating system's migration horror stories are exaggerated. Several problems can be avoided simply by following a few best practices throughout the migration process.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: