A secret word or code used to serve as a security measure against unauthorized access to data. It is normally managed by the operating system or DBMS. However, the computer can only verify the legitimacy of the password, not the legitimacy of the user. See NCSC.|
Password Tips from the NCSC
CHANGE PASSWORD FREQUENTLY - The longer you use a password, the higher the risk.
USE GOOD PASSWORDS - Don't use persons, places or things that can be identified with you.
DON'T DISCLOSE YOUR PASSWORD - Your password is as valuable as the information it protects.
INSPECT YOUR DATA - If you suspect someone has tampered with your files, report it immediately.
NEVER LEAVE AN ACTIVE TERMINAL UNATTENDED - Always log out or lock your terminal before leaving it.
REPORT SUSPECTED COMPUTER ABUSE - Whether directed against you or not, abuse or misuse of your computer resources only hinders the timely completion of your tasks.