The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.
Although many alternatives for user authentication are available today, most users log on to their computer and on to remote computers using a combination of their user name and a password typed at their keyboard. Some retailers will configure their Point of Service terminals to auto login on boot. Some retailers will allow the user to select their own password. To make it easier to remember their passwords, users often use the same or similar passwords on each system; and given a choice, most users will select a very simple and easy-to-remember password such as their birthday, their mother's maiden name, or the name of a relative. Short and simple passwords are relatively easy for attackers to determine. Some common methods that attackers use for discovering a victim's password include:
|
Each of these attack methods can be slowed down significantly or even defeated through the use of strong passwords. Therefore, whenever possible, computer users should use strong passwords for all of their computer accounts. Computers running Windows Embedded for Point of Service (WEPOS) support strong passwords.
Passwords are case-sensitive and may contain as many as 127 characters. A strong password:
Description | Examples |
Lowercase letters | a, b, c,... |
Uppercase letters | A, B, C,... |
Numerals | 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 |
Symbols (all characters not defined as letters or numerals) | ` ~ ! @ # $ % ^ & * ( ) _ + -={ } | [ ] \ : " ; ' < > ? , . / |