Information Technology Services (ITS)
University of Memphis Photo
General Security Frequently Asked Questions (FAQ) Related Topics:

What are the guidelines for choosing a password?

  • Use at least six characters; the more characters the better, as long as you can remember them.
  • Use both lower and uppercase letters.
  • Use at least two numbers in the middle of your password.
  • Avoid using your Universal User ID (UUID), a dictionary word, or numbers associated with your personal information.
  • Avoid using blank spaces.
  • Avoid reusing any past or current passwords.
  • Make your password easy for you to remember but hard for someone else to guess. In this way your password is really a "pass phrase." For example: The phrase "A pass phrase is more secure" becomes "aPassPhras3isM0r3S3cur3"

Best Practices

  • Once you have created your password, keep it secure.
  • Avoid storing passwords where they are visible or in an unlocked desk.
  • Change passwords regularly and frequently.

Why should I care about password security?

Your UUID and password give you access to all of the University's computing services. Every time you connect to the network, you must enter your password to prove you are who you say you are. Should someone else else guess or steal your password, they can masquerade as you, which means the intruder would have access to your files, email, funds, personal information, etc. In short, an insecure password can easily wreak havoc in your life.

How do I access the University's network and resources while off campus?

  • You can access your office computer using Remote Desktop using 128-bit encryption.
  • Soon, the University will provide VPN (Virtual Private Network) for all employees. VPN will then be the standard for remote access.

Can you describe some adverse consequences regarding network security and performance?

  • Poor network stability can threaten business and operations.
  • Inadequate network capacity can severely bottle neck business processes.
  • Inadequate control over network access can jeopardize confidentiality and integrity of data.
  • Slow system response time may impede business processing cycles.
  • A network infection on a single machine may spread rapidly to other networked devices.

Security Standards and Procedures

Text Only | Print | Got a Question? Ask TOM | Contact Us | Memphis, TN 38152 | 901/678-2000 | Copyright 2014 University of Memphis | Important Notice | Last Updated: 
Information Technology Services | 100 Administration Bldg. | Phone: 901.678.8888 | Email:
Last Updated: 3/25/14