Free Ebook cover Cybersecurity Fundamentals for Absolute Beginners

Cybersecurity Fundamentals for Absolute Beginners

New course

14 pages

Passwords, Authentication, and Account Takeover Basics

Capítulo 9

Estimated reading time: 13 minutes

+ Exercise

What “Authentication” Really Means (and What It Does Not)

Authentication is the process of proving you are the legitimate user of an account or system. It answers the question: “Are you really you?” It is different from authorization, which answers: “Now that we know who you are, what are you allowed to do?”

In everyday life, authentication happens when you sign in to email, a bank app, a school portal, or a workplace tool. If authentication fails (or is bypassed), an attacker can impersonate you and take actions as you.

Most authentication methods are built from one or more “factors.” A factor is a category of proof:

  • Something you know: a password, PIN, or security question answer.
  • Something you have: a phone receiving a code, a hardware security key, a smart card.
  • Something you are: biometrics like fingerprint or face recognition.

Using more than one factor is called multi-factor authentication (MFA). MFA is one of the most effective ways to reduce account takeover, but it must be set up correctly and used consistently.

Passwords: What They Are Good For and Where They Fail

A password is the most common “something you know” factor. Passwords are popular because they are easy to deploy and require no extra hardware. But passwords have weaknesses that beginners should understand clearly:

Continue in our app.

You can listen to the audiobook with the screen off, receive a free certificate for this course, and also have access to 5,000 other free online courses.

Or continue reading below...
Download App

Download the app

  • People reuse passwords. If one site is compromised, attackers try the same password on other sites (credential stuffing).
  • People choose guessable passwords. Attackers can guess common patterns quickly.
  • Passwords can be stolen. They can be captured through phishing pages, insecure storage, or device compromise.
  • Passwords can be brute-forced. If a service allows unlimited attempts or weak rate limiting, attackers can try many guesses.

Because passwords alone are fragile, modern security focuses on (1) making passwords stronger and unique, and (2) adding MFA so a stolen password is not enough.

How Passwords Are Stored (in Simple Terms)

Reputable services do not store your password in plain text. Instead, they store a “hash” of it. A hash is a one-way transformation: the service can check if your entered password matches the stored hash, but it should not be able to reverse the hash back into your original password.

However, if attackers steal a database of password hashes, they can still attempt to crack them offline by guessing passwords and hashing them until they find matches. This is why password strength matters even when a company “hashes passwords,” and why unique passwords matter even more.

Account Takeover (ATO): What It Is and Why It’s So Common

Account takeover is when someone gains access to your online account and uses it as if they were you. The attacker’s goal might be money, access to other accounts, data theft, or using your account to scam others.

Common outcomes of account takeover include:

  • Lockout: the attacker changes your password and recovery options.
  • Financial abuse: purchases, transfers, gift cards, or changing payout details.
  • Identity abuse: using your email or social account to impersonate you.
  • Pivoting: using one compromised account (often email) to reset passwords on many others.

Email accounts are especially high value because they are often the “master key” for password resets. If an attacker controls your email, they can often take over many other accounts without ever knowing the original passwords.

How Attackers Get In (Without Repeating Earlier Topics)

This chapter focuses on authentication mechanics, so instead of general trickery or malicious software, we’ll focus on the most common authentication-specific paths to takeover:

  • Credential stuffing: attackers use lists of leaked username/password pairs and try them on many services.
  • Password spraying: attackers try a few common passwords across many accounts (for example, “Winter2026!”) to avoid lockouts.
  • Brute force: attackers try many passwords against one account, often targeting weak passwords.
  • Recovery abuse: attackers exploit weak password reset flows, insecure recovery email access, or outdated phone numbers.
  • MFA fatigue / push bombing: repeated MFA prompts are sent until the user approves one.
  • SIM swap / number takeover: attackers convince a mobile carrier to move your phone number to their SIM, intercepting SMS codes.
  • Session theft: attackers steal a logged-in session token (for example, from an unsecured device), bypassing the need to enter a password again.

Building Strong Passwords: Practical Rules That Work

A strong password is one that is hard to guess and hard to crack. In practice, that means it should be long, unique, and not based on predictable patterns.

Rule 1: Make It Long (Length Beats Complexity)

Length is the biggest contributor to password strength. A long password is harder to crack than a short password with symbols. A practical target for important accounts is a password or passphrase of 14–20+ characters.

Examples of strong passphrases (do not copy these exactly):

  • Correct style: “river-harbor-lantern-cactus-19”
  • Correct style: “PaperClip!Orbit7_Sandwich”

These are long and not easily guessable. They also avoid common substitutions like “P@ssw0rd,” which attackers anticipate.

Rule 2: Make It Unique for Every Account

Uniqueness prevents one breach from becoming many breaches. If you reuse a password and one site leaks it, attackers will try it on your email, banking, shopping, and social accounts.

A simple mental model: reuse turns a single failure into a chain reaction.

Rule 3: Avoid Predictable Patterns

Attackers guess patterns like:

  • Word + year (e.g., “Sunshine2026!”)
  • Season + punctuation (e.g., “Spring!2026”)
  • Keyboard walks (e.g., “qwertyuiop”)
  • Common substitutions (e.g., “@” for “a”, “0” for “o”)

Even if these look “complex,” they are common and therefore guessed early.

Password Managers: How to Use Them Safely (Step-by-Step)

A password manager is a tool that stores your passwords in an encrypted vault. It helps you generate unique, long passwords without memorizing them all. For beginners, using a password manager is often the most realistic way to achieve strong, unique passwords everywhere.

Step-by-Step: Getting Started with a Password Manager

  • Step 1: Choose one manager and commit to it. Consistency matters more than perfection. Use a reputable manager that supports strong encryption and works on your devices.
  • Step 2: Create a strong master password. This should be long and memorable to you, and never reused anywhere else. A passphrase works well.
  • Step 3: Enable MFA on the password manager (if available). This adds a second factor to protect the vault.
  • Step 4: Import or add accounts gradually. Start with your email, banking, and primary social accounts, then expand.
  • Step 5: Use the built-in password generator. For most sites, generate 16–24 character random passwords. Save them in the vault.
  • Step 6: Turn on breach/health checks (if the manager offers it). This helps identify reused or weak passwords.
  • Step 7: Secure recovery. Store recovery codes (for the manager and for MFA) in a safe place. Consider printing them and storing them securely.

Important habit: treat your password manager as a high-value target. Keep devices updated, lock your screen, and do not leave your vault open on shared computers.

MFA (Multi-Factor Authentication): Types and Tradeoffs

MFA adds a second proof beyond the password. If an attacker steals your password, MFA can stop them—unless they also defeat the second factor.

Common MFA Methods (From Stronger to Weaker in Many Cases)

  • Hardware security keys (FIDO2/WebAuthn): A physical key you tap or insert. Strong protection against many login attacks because the key verifies the real website/app.
  • Authenticator app (TOTP codes): A time-based 6-digit code generated on your phone. Stronger than SMS because it does not rely on your phone number.
  • Push notifications: You approve a login on your phone. Convenient but vulnerable to “approve fatigue” if you blindly accept prompts.
  • SMS codes: Better than nothing, but vulnerable to SIM swap and message interception.

If you have a choice, prefer a hardware key or authenticator app over SMS.

Step-by-Step: Enabling MFA the Right Way

  • Step 1: Turn on MFA for your email first. Email often controls password resets for other accounts.
  • Step 2: Choose the strongest available method. If the service supports security keys, consider using them. Otherwise use an authenticator app.
  • Step 3: Save backup codes. Many services provide one-time recovery codes. Store them securely (not in the same email account you’re protecting).
  • Step 4: Add a second MFA method if possible. For example, authenticator app plus a hardware key, or two hardware keys (one stored safely as backup).
  • Step 5: Verify recovery options. Ensure your recovery email and phone number are current and protected with MFA as well.
  • Step 6: Test the login flow. Log out and log back in to confirm you understand the prompts and that backup methods work.

Authentication Mistakes Beginners Make (and How to Avoid Them)

Approving MFA Prompts You Didn’t Initiate

If you receive an MFA prompt when you are not trying to log in, treat it as a warning that someone has your password (or is attempting to sign in). Do not approve it “to make it stop.” Instead, change your password immediately and review account activity.

Using SMS MFA Everywhere Without Protecting the Phone Number

SMS can be intercepted if your phone number is taken over. If you must use SMS, ask your mobile carrier about account protections (for example, a port-out PIN). Prefer app-based codes or security keys when available.

Storing Passwords in Notes or Unencrypted Files

A plain text file or notes app may sync across devices and can be exposed if a device is compromised or shared. Use a password manager vault designed for secure storage.

Weak or Outdated Recovery Options

Attackers often target recovery paths because they can be easier than breaking MFA. Keep recovery email accounts secured with MFA, remove old phone numbers, and avoid security questions with guessable answers.

Password Reset and Account Recovery: Where Security Often Breaks

Password reset is a legitimate feature that can be abused. The reset process is only as strong as the weakest recovery method.

Common Recovery Methods

  • Reset link sent to email: Secure if your email is secure. Dangerous if your email is already compromised.
  • SMS reset code: Convenient but tied to phone number security.
  • Security questions: Often weak because answers can be guessed or found. If you must use them, treat answers like extra passwords (random and stored in your password manager).

Step-by-Step: Hardening Your Recovery Options

  • Step 1: Secure your primary email with strong MFA. This is the foundation for many resets.
  • Step 2: Review account recovery settings on important services (email, banking, cloud storage, social accounts).
  • Step 3: Remove old recovery emails and phone numbers you no longer control.
  • Step 4: Add backup methods (backup codes, second MFA device, second hardware key).
  • Step 5: Store recovery codes safely. Keep them offline or in a secure vault separate from the account being protected.

Session Security: Being Logged In Is a Form of Access

When you log in, many services create a session so you don’t have to enter your password repeatedly. This session is often represented by a token stored in your browser or app. If someone gets that token, they may access your account without knowing your password or triggering MFA.

Practical steps to reduce session risk:

  • Log out on shared/public devices and avoid “remember me” options there.
  • Use device locks (PIN/biometrics) so a stolen or unattended device doesn’t grant instant access.
  • Review active sessions in account settings (many services show logged-in devices). Sign out of sessions you don’t recognize.
  • Be cautious with browser extensions. Some can read web data; keep extensions minimal and trusted.

Detecting Account Takeover Early: What to Check

Many services provide security dashboards or activity logs. Knowing what to look for helps you respond quickly.

Signs Something Is Wrong

  • Unexpected password reset emails or login alerts.
  • MFA prompts you didn’t initiate.
  • New devices or locations in account activity.
  • Changes to profile details: email, phone, shipping address, payout/bank details.
  • Messages you didn’t send or posts you didn’t create.

Step-by-Step: Immediate Response Checklist

  • Step 1: Change the password to a new, unique, long password (use a manager).
  • Step 2: Sign out of all sessions (look for “log out of all devices”).
  • Step 3: Enable or reconfigure MFA. If SMS was used, switch to an authenticator app or security key if possible.
  • Step 4: Check recovery options and remove anything you don’t recognize.
  • Step 5: Review account activity for unauthorized actions (purchases, messages, forwarding rules in email).
  • Step 6: Secure the email account connected to the compromised service, because resets may continue.

Practical Password and MFA Plan for Beginners (A Simple Order of Operations)

If you are starting from scratch, the biggest challenge is not knowledge—it is doing the work in a manageable order. The plan below prioritizes accounts that can unlock other accounts.

Step-by-Step: A Realistic Upgrade Path

  • Step 1: Secure your primary email: unique long password + MFA + updated recovery options.
  • Step 2: Secure your password manager: strong master password + MFA + saved recovery codes.
  • Step 3: Secure financial accounts: banking, payment apps, shopping sites with saved cards. Turn on MFA and alerts.
  • Step 4: Secure your mobile carrier account: add a port-out PIN or similar protection if available.
  • Step 5: Secure social and messaging accounts: prevent impersonation and scams sent from your identity.
  • Step 6: Replace reused passwords: use the password manager’s audit tools to find and fix reuse.

Examples: Turning Weak Authentication Into Strong Authentication

Example 1: Streaming Account With a Reused Password

Weak setup: reused password, no MFA. If the password appears in a leak, attackers can log in and change the email.

Stronger setup:

  • Generate a unique 18+ character password in a password manager.
  • Enable MFA if the service supports it.
  • Verify the email on the account is correct and secured with MFA.

Example 2: Email Account Used for Resets Everywhere

Weak setup: short password, SMS MFA, old recovery phone number still listed.

Stronger setup:

  • Change to a long passphrase.
  • Switch MFA to an authenticator app or security key.
  • Remove outdated recovery options and store backup codes offline.
  • Review forwarding rules and connected apps/devices in settings.

Example 3: Workplace Account With Push MFA

Risk: repeated push prompts can lead to accidental approval.

Safer routine:

  • Never approve an unexpected prompt.
  • If prompts appear, report it and change password immediately.
  • Ask whether number matching or security keys are available (these reduce accidental approvals).

Key Terms You Should Be Comfortable With

  • Credential stuffing: trying leaked username/password pairs on other sites.
  • Password spraying: trying a few common passwords across many accounts.
  • Brute force: trying many passwords against one account.
  • MFA: using two or more authentication factors.
  • TOTP: time-based one-time password codes from an authenticator app.
  • FIDO2/WebAuthn: modern standards for hardware keys and passkey-style authentication.
  • Session token: a “proof of login” stored after authentication that keeps you signed in.
  • Recovery codes: one-time codes used to regain access if you lose your MFA device.

Practice Exercise: Audit One Account End-to-End

Choose one important account (preferably email) and walk through this checklist in its security settings:

  • Is the password unique and at least 14–20 characters?
  • Is MFA enabled? Which method is used?
  • Are backup codes generated and stored safely?
  • Are recovery email/phone numbers correct and secured?
  • Do you recognize all logged-in devices/sessions?
  • Are alerts enabled for new logins or sensitive changes?

Doing this once, carefully, teaches you the pattern you can repeat across your other accounts.

Now answer the exercise about the content:

Why is enabling MFA helpful even if you already use a strong, unique password?

You are right! Congratulations, now go to the next page

You missed! Try again.

MFA requires more than just a password (for example, something you have or are). This helps stop account takeover when passwords are stolen through phishing, reuse, or leaks.

Next chapter

Safe Browsing, Links, Downloads, and Phishing Signals

Arrow Right Icon
Download the app to earn free Certification and listen to the courses in the background, even with the screen off.