Professional Documents
Culture Documents
Acceptance
Acceptance
3
http://internetcensus2012.bitbucket.org/paper.html
Page 6 Password Guidance Simplifying Your Approach
4
Consonant-vowel-consonant constructions
Password Guidance Simplifying Your Approach Page 9
Infographic summary
Password Guidance Simplifying Your Approach Page 13
Disclaimer
This document has been produced jointly by GCHQ and CPNI. It is not intended to be an exhaustive guide to
potential cyber threats, is not tailored to individual needs and is not a replacement for specialist advice.
Users should ensure they take appropriate specialist advice where necessary.
This document is provided without any warranty or representation of any kind whether express or implied.
The government departments involved in the production of this document cannot therefore accept any
liability whatsoever for any loss or damage suffered or costs incurred by any person arising from the use of
this document.
Findings and recommendations in this document have not been provided with the intention of avoiding all
risks and following the recommendations will not remove all such risks. Ownership of information risks
remains with the relevant system owner at all times.
Crown Copyright 2015