0% found this document useful (0 votes)
149 views5 pages

A) Passwords: How and Why Do You Use It?

The document discusses various topics related to passwords, logging in, and biometrics as methods of authentication. It describes what a password is and how they are commonly used, but also notes that passwords are not perfectly secure since hackers can potentially break them. Fingerprints and other biometrics like eye scans are presented as more secure alternatives to passwords for logging into devices and accounts. However, biometrics still carry risks if someone is able to hack or access the biometric data. Overall the document evaluates different authentication methods and the tradeoffs between convenience, security, and vulnerabilities.

Uploaded by

ANDREI V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views5 pages

A) Passwords: How and Why Do You Use It?

The document discusses various topics related to passwords, logging in, and biometrics as methods of authentication. It describes what a password is and how they are commonly used, but also notes that passwords are not perfectly secure since hackers can potentially break them. Fingerprints and other biometrics like eye scans are presented as more secure alternatives to passwords for logging into devices and accounts. However, biometrics still carry risks if someone is able to hack or access the biometric data. Overall the document evaluates different authentication methods and the tradeoffs between convenience, security, and vulnerabilities.

Uploaded by

ANDREI V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

A)Passwords

What is a password?

A password is the most common way to protect your data, websites data and all other stuff that requires to
be somehow protected, usually it consists in forms of numbers and letters combined together.
A password, sometimes called a passcode, is a memorized secret, typically a string of characters,
used to confirm the identity of a user.( wikipedia).

How and why do you use it?

I use password to protect my data and also myself from potential hackers or someone who really wants to
enter my computer, email or social networks. I prefer to use different passwords for all my stuff because is
more safe for me and for my computer. Hos I use it, well I want it to be easy for me to remember and also
hard for someone to find it out. For example someone’s name combined with a city or some sort of
numbers or even combine them together. It is important to not use something that is common to your
name,city,phone number.

Do you think they are secure? Why?

Yes they are secure because you can change it as many times as you want,but they are not 100%
secured,because there is always a hacker that can broke them in any day of the week.

B) Logging in- is like to enter in your existing account, like log into Facebook or Else.Fcim

Username – is your personalized nickname that you can put it as a username in a game or an account.

Password – I said it upper 

Secure – is like a feeling that you and your data is in the right place at right time

Standard – is a term that describes a right way to do a thing or steps that you should use to do a task.

Internet – is a cybernetic space where you can do what you want when you want.

Browser – is a software product for searching all the information that you want, just install (chrome, opera,
firefox and many others) and just search for it. It can be all type of info from food info to music.

Fingerprint – is a more secure and hard to hack rather than a password, because every single human has a
unique fingerprint.

Common knowledge – these are knowledges or information that are taught to a big or “n” number of
students for example.

Data – simply, an amount of information, it can be photos or homework, like information that acomputer
can store and read

Breaches - This is a list of data breaches, using data compiled from various sources, including press
reports, government news releases, and mainstream news articles. The list includes those involving the
theft or compromise of 30,000 or more records, although many smaller breaches occur continually.
Breaches of large organizations where the number of records is still unknown are also listed. The
various methods used in the breaches are also listed, with hacking being the most common.(Wikipedia )

Because I don’t know this word

Time – time is a way that we can measure how much time we use or spend on different things in 24
hours. Time is the indefinite continued progress of existence and events that occur in an apparently
irreversible succession from the past, through the present, into the future. Time is a component quantity
of various measurements used to sequence events, to compare the duration of events or the intervals
between them, and to quantify rates of change of quantities in material reality or in the conscious
experience. Time is often referred to as a fourth dimension, along with three spatial dimensions.

Resources – a synonym for data, is like an amount of information.

Vulnerable – it can be a person that needs help.

Biometrics - Biometrics is the technical term for body measurements and calculations. It refers to
metrics related to human characteristics . Biometrics authentication (or realistic authentication) is
used in computer science as a form of identification and access control.(Wikipedia).

C) Fingerprints

Fingerprints in our days is the most common way to protect our phones, tablets, laptops from unwantable
guests. It is so used because is cheap to insert a scanner in phone or in a laptop, and also very secure. This
type of protection gives us as a humans to make our life a bit easier, for example not to remember hard or
passwords and also they are so sensitive that you just put your finger and your device will unlock in a
second. I think that this future is now because now you can actually unlock or enter your Social Media
accounts just with your finger, or like to log in your online books accounts (like online library). In the future I
think you will unlock all this stuff and logging in process with your face or some sort of eye scanner.

D) Biometrics

Eyes

wwcd: unlock or log in to your devices, accounts

sr: if someone, somehow will hack or even crack your eye scan, you are in trouble because all your data and
personal information isn’t in right hands and maybe could have access to bank cards, accounts etc.

Fingerprints

Wwcd: unlock or log in to your devices, accounts


sr: the same as at eyes

DNA

Wwcd: Faster medical diagnosis maybe some kind of nano molecular medicine cure, or to change some
parts of DNA to cure maladies like cancer brain tumors and many others, because if we’ll be able to change
it we could even develop an indestructible human or like immortal one.
Sr: if somehow anyone could have access to our DNA so we are in a big trouble, imagine if that hacker will
develop a nano-robot and use it as a killer, to infiltrate it in vaccines and if that robot could have access to
DNA, anything could happen.

Body smell

Wwcd: maybe to develop a robot that could use body smell and never lost that information, and if for
example that person commits a murder he will be easier to find him (this robot could be like an criminalist
or smth. like that )

Sr:

E) Login – password, sign up, Social Media, PC, smartphone, account, media, security, username, website.

F) Devices

Smart glasses and watch, because in our days these are with touch screen and maybe futuristic.

3D printer, USB drive, Scanner, Digital camera, MP3 player are hardware devices or their components are
not so related to software and coding stuff .

Listening:

Phrase match-

1f

2h

3a

4c

5i

6d

7e

8j

9g

10 b

Guess

1a

2a

3d

4a
5a

6d

7d

8c

9b

10 b

Text:

1 their way out

2 our login credentials

3 web audentification

4 be universaly

5 login securly

6 usb security

7 pass being numbered

Spelling

Credentials, infinitaly, …, process, device, recognition, knowledge, default, breaches, vulnerable, achieved,
biometrics.

Put the words:

Usernames and pass… are in their way out

Worry about the security of our login credentials

Replaced by an infinitely more secure login system

A system that will universally used

It will allow website users to log in

Spoke about the days of passwords being numbered

Common knowledge that passwords have outlived their efficacy

Improve the security of their online experiences

Web authentication means users are at less risk

Login authentication is achieved via physical devices.

You might also like