Know and understand the differences between strong and weak passwords

ICT 0417 – Networks and Password Security

4 Networks and the Effects of Using Them

Objective

Know and understand the differences between strong and weak passwords.

What is a Network?

A network is a collection of computers, servers, and other devices that are linked together to share resources, exchange data, and communicate.

Common Types of Networks

  • LAN (Local Area Network) – covers a small geographic area such as a home, office or school.
  • WAN (Wide Area Network) – spans large distances, often connecting multiple LANs (e.g., the Internet).
  • MAN (Metropolitan Area Network) – covers a city or campus.
  • Wireless (Wi‑Fi) Networks – use radio waves to connect devices without cables.

Effects of Using Networks

Using networks brings many advantages but also introduces risks that must be managed.

Advantages

  • Resource sharing – printers, files, and internet connections can be used by many users.
  • Collaboration – real‑time communication through email, chat, and video conferencing.
  • Centralised data storage – easier backup and management.
  • Cost efficiency – reduces the need for duplicate hardware.

Disadvantages / Risks

  • Security threats – unauthorised access, malware, and data interception.
  • Network congestion – too many users can slow performance.
  • Reliance on infrastructure – a single failure can affect many users.
  • Privacy concerns – data may be exposed if not properly protected.
Suggested diagram: Simple LAN layout showing computers, a switch, a router and an internet connection.

Why Password Security Matters in Networks

Passwords are the first line of defence against unauthorised access to network resources. Weak passwords can compromise an entire network, while strong passwords help protect data and maintain system integrity.

Characteristics of Strong Passwords

  • Length – at least 8–12 characters (longer is better).
  • Complexity – includes a mix of uppercase letters, lowercase letters, numbers and symbols.
  • Unpredictability – does not contain common words, personal information or simple patterns.
  • Uniqueness – different passwords for different accounts or services.

Characteristics of Weak Passwords

  • Short – fewer than 8 characters.
  • Lack of variety – only letters or only numbers.
  • Predictable – common words, names, birthdays, “123456”, “password”.
  • Reused – the same password across multiple accounts.

Comparison of Strong vs. Weak Passwords

Feature Strong Password Weak Password
Length ≥ 12 characters ≤ 7 characters
Character set Uppercase, lowercase, numbers, symbols Only letters or only numbers
Predictability Random, no dictionary words Common words, personal data, simple sequences
Reuse Unique per account Same password for many accounts
Resistance to attacks High – resists brute‑force and dictionary attacks Low – easily cracked

Tips for Creating and Managing Strong Passwords

  1. Use a passphrase: combine unrelated words, e.g., Blue!River$28.
  2. Employ a reputable password manager to store unique passwords securely.
  3. Enable two‑factor authentication (2FA) wherever possible.
  4. Change passwords regularly, especially after a security breach.
  5. Avoid writing passwords down in plain view; use encrypted digital notes if needed.

Common Pitfalls to Avoid

  • Using “password”, “admin”, or the word “12345”.
  • Including personal information such as name, birthdate, or address.
  • Repeating the same password across work, school and personal accounts.
  • Sharing passwords via email or instant messaging.

Summary

Networks provide powerful ways to share resources and collaborate, but they also expose users to security risks. Understanding the difference between strong and weak passwords is essential for protecting networked systems. By using long, complex, unique passwords and supporting measures such as 2FA, students can help keep their data safe and maintain the integrity of the networks they use.