There are basically two ways in which an IT criminal can access a password and your data:
In order to make it more difficult for an IT criminal to access passwords and data, AU places certain requirements on the length and complexity of passwords for, for example, AU computers and the university’s IT systems.