Security Awareness

  • Confidentiality: Prevent unauthorized access for confidential information,
  • Integrity: Protect data from unauthorized alterations and modifications,
  • Availability: Ensure sensitive data is exists whenever authorized party needs to access it.
  • Use more than 9 characters.
  • Use numbers as well letters with both upper and lower cases.
  • Use symbolic characters like @, !, $, % and so on.
  1. Use Password Manager systems too create the passwords: They have strong encryption mechanisms to encrypt and create your password. Even you have free password manager systems in internet and review them thoroughly via internet before use them.
  2. Use master password to get into your password manager. As much as we secure our master password, anyone will not b able to access our password which is created by password manager.
  3. Follow the best practices to choose the master password.
  4. Use multiple words (at least 5–10 words depends on your security) in your password which are not related to you (like your birthday, your relative names, your pet’s name and so on),
  5. Try to choose words which are not related to each other (ex: Mountain greedy form Truncate Issue),
  6. Use spaces between the words (Then you will not have any meaningful word even by merging them),
  7. Use numbers and character between different letters,
  8. Use words something does not exists,
  9. Use words with misspelled letters (Uropian instead of European
  • Use always really strong passwords with your systems.
  • Do encryption or hashing with your data(Salting).
  1. Symmetric Encryption
  • Data Encryption Standard (DES)
  • Advanced Encryption Standard (AES),
  • Cipher Block Chain (CBC).
Reference: https://sectigostore.com/blog/5-differences-between-symmetric-vs-asymmetric-encryption/
  • Rivest, Shamir, Adelman Algorithm (RSA),
  • Diffie Hellman Algorithm,
  • Digital Signature Algorithm.
Reference: https://sectigostore.com/blog/5-differences-between-symmetric-vs-asymmetric-encryption/

Hashing

  • MD4
  • MD5
  • SHA-1,SHA-256, SHA-512

Salting

  • Always consider about the back-end as well front-end vulnerabilities of the system.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sanduni Jayaweera

Sanduni Jayaweera

Associate Software Engineer at Virtusa.