In general networks and databases, in order to ensure information security, each user can perform only authorized operations such as “read” and “write”.
For example, in the file server, in order to prevent the information stored on the computer from being leaked to the outside, it is possible to restrict users who are not related to their work from opening or copying files.
In this way, individual users must be able to be identified in order to give different usage rights. Therefore, network and database administrators set up individual user accounts for each user.
In order to use your own user account, you must use the given user name and authenticate yourself to confirm your identity. When authenticating a user, enter a password to prove that you are the legitimate owner of the username.
If someone else uses your user account, it will be possible for a user who is not originally given the right to use it to connect to the network, or to illegally extract information from the database. In order to prevent such hacking by spoofing, each user must manage the password strictly.
Proper management of passwords is indispensable not only for protecting one user but also for ensuring information security for the entire company or organization.
Also, at shopping sites, etc., various personal information is managed using the user name and password. Therefore, if the user name and password are known to others, personal information such as product purchase history, address, and phone number will be leaked. Some shopping sites store credit card number data as member management, so there is a risk that a third party will make purchases with the credit card you registered.