The Data‑Protection Act 2018 (UK) and the General Data‑Protection Regulation (GDPR) require organisations to protect personal and sensitive data. Key obligations include:
Secure login credentials (user ID + password) are a fundamental part of meeting these legal requirements.
A user ID (also called a username or login name) is a unique identifier that distinguishes one account from another on a computer system, network or online service.
A password is a secret string of characters known only to the account holder. It is used together with the user ID to verify identity.
In the context of the UK DPA/GDPR:
| Threat | How It Affects Credentials |
|---|---|
| Phishing | Fake emails/websites trick users into entering their user ID and password. |
| Smishing | SMS messages contain links to counterfeit login pages. |
| Vishing | Phone calls persuade users to reveal credentials verbally. |
| Pharming | DNS or hosts‑file manipulation redirects users to a fraudulent site that captures login details. |
| Brute‑force attacks | Automated tools try many password combinations until one works. |
| Keyloggers & malware | Malicious software records keystrokes or reads stored passwords. |
| Social engineering | Manipulation of people to obtain passwords or security answers. |
| Hacking (credential‑stealing) | Exploits in software or databases expose stored password hashes. |
| Viruses & other malware | Can install back‑doors that capture login data or disable security controls. |
| Card‑fraud (online) | Compromised login pages harvest both payment details and credentials. |
| Safeguard | Purpose & How It Helps |
|---|---|
| Encryption (at rest & in transit) | Transforms data into unreadable form; protects passwords stored on disks and data sent over networks (e.g., HTTPS). |
| SSL/TLS & Digital certificates | Creates a trusted, encrypted link between client and server; certificates verify the server’s identity. |
| Firewalls (network & host) | Block unauthorised traffic, reducing the chance of remote attacks that aim to capture credentials. |
| Biometrics | Physical traits (fingerprint, facial recognition) provide an additional factor beyond the password. |
| Two‑Factor Authentication (2FA) / Multi‑Factor Authentication (MFA) | Requires a second verification step (e.g., one‑time password, authenticator app). 2FA = exactly two factors; MFA = two or more factors. |
stored_hash = SHA‑256( password + salt )
The original password cannot be recovered from the hash; the salt prevents rainbow‑table attacks.
A strong password is hard to guess or crack. It should meet all of the following criteria:
| Requirement | Details |
|---|---|
| Minimum length | ≥ 12 characters |
| Character types | Uppercase, lowercase, numbers, symbols |
| Prohibited content | No personal information, dictionary words, or sequential patterns |
| Expiration | Every 90 days or after a confirmed breach |
| Reuse restriction | Cannot reuse the previous 5 passwords |
| Lock‑out policy | Account locked after 5 failed attempts for 15 minutes |
| Recovery | Verified email or authenticator app; avoid easily guessed security questions |
| MFA requirement | Enabled for all privileged or remote‑access accounts |
V3r!$t1c@l#2024
Explanation:
User → enters User ID & Password
│
▼
System → verifies hash (Password + Salt)
│
├─ If mismatch → Access denied
│
▼
System → sends OTP to registered device (SMS / Authenticator app)
│
▼
User → enters OTP
│
├─ If OTP correct → Access granted
│
▼
If OTP incorrect → After 3 tries → Account lock‑out
Secure login credentials are a cornerstone of data protection under the UK DPA and GDPR. By using unique user IDs, strong passwords, and additional safeguards such as hashing, salting, encryption, firewalls and multi‑factor authentication, individuals and organisations can:
Applying the password‑policy checklist, using a reputable password manager, and following safe online behaviours will help learners meet the Cambridge IGCSE 0417 objectives and protect personal and sensitive information.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.