In respect to sharing vital information with anyone such as social networking accounts, bank accounts, a person needs to be quite cautious enough to understand the basic privacy rights are not exploited by hackers and web based attacks. The aim of the topic is to show different aspects which could make man aware of bad practices while handling accounts.
Shared accounts fall under one of the bad practices, where a person shares account with friends or family members. It might happen when the person’s account details can get hacked when any of friends can take fair advantage out of this. It can happen with any social networking or bank accounts. No need of password for unique user accounts might be beneficial but it might pose a risk in security when anyone can access accounts to hack important data on the system, so a valid password is necessary (Aloul et al., 2012). Passwords need to be changed as well for unique user accounts every ninety days or else hackers have the software to copy the password and hack the account of any social media, for example. In that case, password expiration policies should exist to mitigate the problems (Chiasson & Oorschot, 2015). Administers, have the privilege to perform activities of basic users checking mails or surfing internet. However, using those privilege accounts by the administrators might be susceptible to web based attacks and hijackers (Aloul et al., 2012). Therefore, they should use their accounts for they are intended to instead of performing basic user tasks.
In terms of protection of different accounts, a person has to be careful enough to handle them in respective field. In this unsecured world of technology, each and everyone needs to be prudent enough to understand the difficulties posed by internet on a regular basis
Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1-6.
Chiasson, S., & Van Oorschot, P. C. (2015). Quantifying the security advantage of password expiration policies. Designs, Codes and Cryptography, 77(2-3), 401-408.