Know and understand the differences between strong and weak passwords.
What is a Network?
A network is a collection of computers, servers, and other devices that are linked together to share resources, exchange data, and communicate.
Common Types of Networks
LAN (Local Area Network) – covers a small geographic area such as a home, office or school.
WAN (Wide Area Network) – spans large distances, often connecting multiple LANs (e.g., the Internet).
MAN (Metropolitan Area Network) – covers a city or campus.
Wireless (Wi‑Fi) Networks – use radio waves to connect devices without cables.
Effects of Using Networks
Using networks brings many advantages but also introduces risks that must be managed.
Advantages
Resource sharing – printers, files, and internet connections can be used by many users.
Collaboration – real‑time communication through email, chat, and video conferencing.
Centralised data storage – easier backup and management.
Cost efficiency – reduces the need for duplicate hardware.
Disadvantages / Risks
Security threats – unauthorised access, malware, and data interception.
Network congestion – too many users can slow performance.
Reliance on infrastructure – a single failure can affect many users.
Privacy concerns – data may be exposed if not properly protected.
Suggested diagram: Simple LAN layout showing computers, a switch, a router and an internet connection.
Why Password Security Matters in Networks
Passwords are the first line of defence against unauthorised access to network resources. Weak passwords can compromise an entire network, while strong passwords help protect data and maintain system integrity.
Characteristics of Strong Passwords
Length – at least 8–12 characters (longer is better).
Complexity – includes a mix of uppercase letters, lowercase letters, numbers and symbols.
Unpredictability – does not contain common words, personal information or simple patterns.
Uniqueness – different passwords for different accounts or services.
Characteristics of Weak Passwords
Short – fewer than 8 characters.
Lack of variety – only letters or only numbers.
Predictable – common words, names, birthdays, “123456”, “password”.
Reused – the same password across multiple accounts.
Comparison of Strong vs. Weak Passwords
Feature
Strong Password
Weak Password
Length
≥ 12 characters
≤ 7 characters
Character set
Uppercase, lowercase, numbers, symbols
Only letters or only numbers
Predictability
Random, no dictionary words
Common words, personal data, simple sequences
Reuse
Unique per account
Same password for many accounts
Resistance to attacks
High – resists brute‑force and dictionary attacks
Low – easily cracked
Tips for Creating and Managing Strong Passwords
Use a passphrase: combine unrelated words, e.g., Blue!River$28.
Employ a reputable password manager to store unique passwords securely.
Change passwords regularly, especially after a security breach.
Avoid writing passwords down in plain view; use encrypted digital notes if needed.
Common Pitfalls to Avoid
Using “password”, “admin”, or the word “12345”.
Including personal information such as name, birthdate, or address.
Repeating the same password across work, school and personal accounts.
Sharing passwords via email or instant messaging.
Summary
Networks provide powerful ways to share resources and collaborate, but they also expose users to security risks. Understanding the difference between strong and weak passwords is essential for protecting networked systems. By using long, complex, unique passwords and supporting measures such as 2FA, students can help keep their data safe and maintain the integrity of the networks they use.