Note: This is a short extract from a training course
developed by Cosaint Inc. which is aimed at the
users of computer systems. You should assume that we have already covered what makes a password strong, and what makes a password
weak earlier in the course.
For more information about this and other information
security training courses available from Cosaint,
please visit http://www.cosaint.net/