Computer Science Grade 9 20 min

3. Passwords and Authentication

Learn about password security best practices, including creating strong passwords and using multi-factor authentication.

Tutorial Preview

1

Introduction & Learning Objectives

Learning Objectives Define authentication and differentiate between authentication factors. Analyze the characteristics of strong vs. weak passwords. Explain how a brute-force attack works to crack passwords. Describe the function and importance of Multi-Factor Authentication (MFA). Identify the common signs of a phishing attempt. Create a strong, unique password using best practices and understand the role of password managers. Ever used your pet's name as a password? 🤔 Let's explore why that's like leaving your house key under the doormat for hackers! This lesson will teach you how to create digital locks (passwords) that are nearly impossible to break. We'll cover what makes a password strong, how to spot online tricks, and how to use advanced securi...
2

Key Concepts & Vocabulary

TermDefinitionExample AuthenticationThe process of verifying that someone is who they claim to be. It's like showing your ID to prove your identity before being allowed into a secure area.Entering your username and password to log into your email account. PasswordA secret string of characters (letters, numbers, symbols) used to verify a user's identity during authentication.A weak password is `cat123`. A strong password is `C@t-Jump$-ov3r-M00n!`. Brute-Force AttackA cyberattack where a program automatically tries millions of different password combinations in rapid succession until it finds the correct one.A script trying 'a', 'b', 'c', then 'aa', 'ab', 'ac', and so on, to guess the password for a user's account. M...
3

Core Syntax & Patterns

Password Complexity Formula Strength = Length + Uppercase + Lowercase + Numbers + Symbols Use this formula to create a strong password. The longer it is and the more character types it includes, the exponentially harder it is for a brute-force attack to succeed. Aim for at least 12-16 characters. Authentication Factors Factors = (Something you KNOW) + (Something you HAVE) + (Something you ARE) This is the principle behind MFA. A strong authentication system uses at least two of these factors. 'Know' is a password, 'Have' is a phone or security key, and 'Are' is a fingerprint or face scan. One Account, One Password Principle Account(A) -> Password(A); Account(B) -> Password(B) Never reuse passwords. If you use the same password ever...

4 more steps in this tutorial

Sign up free to access the complete tutorial with worked examples and practice.

Sign Up Free to Continue

Sample Practice Questions

Challenging
A company wants to defend against brute-force attacks on its login page. Which of the following security policies would be the LEAST effective if implemented by itself?
A.Enforcing mandatory Multi-Factor Authentication (MFA) for all users.
B.Requiring passwords to be changed every 30 days.
C.Locking an account for 15 minutes after 5 incorrect password attempts.
D.Requiring long and complex passwords (15+ characters with mixed types).
Challenging
A website's password policy requires 8+ characters, 1 uppercase letter, and 1 number. A user creates the password `Password123`. While this password meets the policy, why is it still considered very weak?
A.It is too long for a user to remember reliably.
B.It does not contain a special symbol, which is the most important factor.
C.It is a sequential pattern that does not follow the 'One Account, One Password Principle'.
D.It is one of the most common passwords and would be at the top of a dictionary or brute-force attack list.
Challenging
Imagine a new authentication method: a special USB key that you must plug into your computer. According to the 'Authentication Factors' framework, how would this key be classified, and what would it need to be combined with for a valid MFA setup?
A.Something you ARE; it would need to be combined with a fingerprint.
B.Something you KNOW; it would need to be combined with a security question.
C.Something you HAVE; it would need to be combined with a password.
D.Something you HAVE; it would need to be combined with a second, different USB key.

Want to practice and check your answers?

Sign up to access all questions with instant feedback, explanations, and progress tracking.

Start Practicing Free

More from V. Cybersecurity Fundamentals

Ready to find your learning gaps?

Take a free diagnostic test and get a personalized learning plan in minutes.