{"id":1126,"date":"2021-11-10T11:15:24","date_gmt":"2021-11-10T11:15:24","guid":{"rendered":"https:\/\/devnorthwales.wpengine.com\/?p=1126"},"modified":"2023-08-15T17:01:06","modified_gmt":"2023-08-15T16:01:06","slug":"diogelwch-cyfrineiriau-a-systemau-dilysu","status":"publish","type":"post","link":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/","title":{"rendered":"Diogelwch cyfrineiriau a systemau dilysu"},"content":{"rendered":"<p>Wrth feddwl am gyfrineiriau cryf, y gamp yw creu rhywbeth cofiadwy ond eto heb fod yn amlwg. Ar ben hyn, mae cyfrineiriau unigryw fel arfer yn cynnwys cymysgedd o briflythrennau a llythrennau bach, rhifau a symbolau, sy\u2019n helpu i wella cryfder y cyfrinair. Felly, mae\u2019r siawns o gofio\u2019r cyfrineiriau ar yr adeg y byddwch chi angen eu defnyddio, yn isel. Sawl gwaith ydych chi wedi gorfod ail osod eich cyfrinair ar \u00f4l ceisio mewngofnodi amryw o weithiau gan i chi feddwl y byddech chi\u2019n cofio ryw gyfrinair neilltuol, neu\u2019n meddwl bod <em>Google Password Manager<\/em> wedi\u2019i storio? Er bod meddwl am gyfrineiriau newydd a mwy cymhleth sy\u2019n defnyddio nodau arbennig, yn unol \u00e2 pholisi cyfrineiriau, yn ddigon i\u2019ch gwylltio, mae\u2019n hanfodol er mwyn diogelu eich cyfrifon a\u2019ch gwybodaeth bersonol.<\/p>\n<p>Gyda mwy o <a href=\"https:\/\/expertinsights.com\/insights\/the-most-significant-password-breaches\/\">dor-diogelwch <\/a>yn digwydd ar wefannau mawr a llwyfannau cyfryngau cymdeithasol, mae\u2019n bwysig hefyd peidio ag ailddefnyddio cyfrineiriau er bod llawer ohonom yn gwneud hynny. Os ydych chi\u2019n ailddefnyddio cyfrineiriau, y cyfan sydd ei angen yw un ymgais i we-rwydo pan fyddwch chi\u2019n clicio\u2019n ddiofal ar ddolen faleisus, a gallai eich holl gyfrifon ar-lein fod mewn perygl. Gallwch edrych ar wahanol <a href=\"https:\/\/haveibeenpwned.com\/Passwords\">wefannau <\/a>i weld a yw\u2019r cyfrinair rydych chi\u2019n troi ati o hyd wedi\u2019i datgelu mewn tor-ddiogelwch data (neu gallwch wirio cryfder unrhyw ddarpar gyfrinair newydd). Mewn gwirionedd, ni ddylech chi fyth ddefnyddio cyfrinair fwy nag unwaith. Mae cyfrinair sydd wedi\u2019i dyblygu yr un peth \u00e2 chyfrinair wan.<\/p>\n<p>Mae cyfrinymadrodd yn gallu bod yn haws i\u2019w gofio na chyfrinair, pan ddaw\u2019n fater o ddilysu. Drwy feddwl am frawddeg sy\u2019n gwneud synnwyr i chi, gallwch wneud eich cyfrinair yn fwy diogel a\u2019r gobaith yw y byddwch yn gallu cofio\u2019r frawddeg yn haws na chyfres o rifau, llythrennau a symbolau ar hap. Os mai dim ond i chi mae\u2019r frawddeg yn gwneud synnwyr, mae hefyd yn diogelu\u2019r cyfrinymadrodd rhag ymosodiadau brwnt. Dyma pan fydd hacwyr yn ceisio dyfalu eich gwybodaeth fewngofnodi drwy ddefnyddio dull cynnig a gwella. Ond os ydych chi\u2019n gwybod eich bod chi\u2019n defnyddio <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-47974583\">geiriau tebyg <\/a>neu ymadroddion tebyg ar draws cyfrifon, yna gallai hyn olygu bod eich cyfrifon yn agored i ymosodiadau brwnt gan ddaw patrwm i\u2019r amlwg os mai dim ond ychydig o wahaniaeth sydd rhwng y cyfrineiriau a\u2019r cyfrinymadroddion. Cadwch bob cyfrinair a chyfrinymadrodd yn gwbl wahanol ac ystyriwch eu newid nhw\u2019n weddol reolaidd.<\/p>\n<p>Yna mae\u2019r cwestiwn yn codi, \u201cSut i gadw trefn ar enwau defnyddiwr a chyfrineiriau?\u201d Mae cadw trefn ar eich holl enwau defnyddiwr a\u2019ch cyfrineiriau yn gallu bod yn rhywbeth mor syml \u00e2\u2019u hysgrifennu mewn llyfr cofnod. Er hynny, ni ddylech chi fyth gario llyfr cofnod efo chi rhag ofn i chi ei golli a pheryglu i rywun dorri mewn i\u2019ch holl gyfrifon. Mae\u2019r rhan fwyaf o bobl yn derbyn bod rheolwyr cyfrineiriau ar-lein yn ffordd hawdd i fynd at eich manylion diogelwch unrhyw le, unrhyw bryd (dim ond i chi ofalu eich bod chi\u2019n defnyddio cysylltiad di-wifr diogel).<\/p>\n<p>Rydych chi wedi chwarae eich rhan i sicrhau bod gennych gyfrinair ddiogel ond sut mae\u2019r amrywiol wefannau a llwyfannau yr ydych chi\u2019n eu defnyddio yn creu prosesau dilysu sydd wedi\u2019u diogelu?<\/p>\n<p>Mae <em>Transport Layer Security<\/em> (TLS) yn olynydd i <em>Secure Sockets Layer<\/em> (SSL), sef protocol cryptograffig sydd yn diogelu\u2019r cyfathrebu dros rwydwaith cyfrifiadurol. Caiff ei ddefnyddio\u2019n bennaf mewn rhaglenni fel e-bost, negeseua cyflym, a Protocol Llais dros y Rhyngrwyd (VoIP) ond ei ddefnydd fel haen ddiogelwch yn HTTPS sydd amlycaf i\u2019r cyhoedd. Dyma pan welwch chi\u2019r eicon clo yn y porwr gwe pan fyddwch chi\u2019n gwneud trafodion ariannol neu\u2019n edrych ar ddeunydd cyfrinachol.<\/p>\n<p>Mae amgryptio yn ddigon da i ddiogelu gwybodaeth a gaiff ei throsglwyddo rhwng porwr a gweinydd, ond mae chwalu <em>(\u2018hashing\u2019) <\/em>yn ofyniad sylfaenol i storio cyfrineiriau cryf a diogel. Mae hyn yn creu\u2019r hyn a elwir yn gyfrineiriau chw\u00e2l <em>(\u2018hashed\u2019)<\/em> yn hytrach na chronfa ddata o gyfrineiriau sy\u2019n storio\u2019r cyfrineiriau eu hunain, all gael eu hacio. Mae cyfrineiriau sy\u2019n cael eu cadw ar ffurf ddarllenadwy yn cael eu galw\u2019n destun clir \u2013 yn amlwg, dyma\u2019r fformat lleiaf diogel a dylid ei osgoi yn gyfan gwbl.<\/p>\n<h2>Beth yn union yw chwalu <em>(\u2018hashing\u2019)<\/em>?<\/h2>\n<p>Mae proses ddilysu sy\u2019n wirioneddol ddiogel ar gyfer cyfrif ar-lein yn gofyn am i gyfrinair gael ei chwalu. Pan fydd defnyddiwr yn teipio cyfrinair, bydd algorithm chwalu yn creu allbwn, sy\u2019n cael ei alw\u2019n \u2018hash cyfrinair\u2019. Mae\u2019n hawdd i\u2019r system ddilysu gwblhau\u2019r \u2018hash\u2019 ond mae bron yn amhosibl i fynd yn \u00f4l i\u2019r mewnbwn gwreiddiol o wybod y gwerth \u2018hash\u2019 yn unig. Ni allwch chi greu mewnbwn cychwynnol efo\u2019r nod o gyflawni allbwn penodol. Dyma ble mae chwalu\u2019n wahanol i amgryptio, ac yn fwy diogel nag amgryptio, gan mai mecanwaith unffordd ydyw.<\/p>\n<p>Nid oes posib dad-chwalu cyfrineiriau sydd wedi\u2019u chwalu, ond mae posib troi data sydd wedi\u2019i amgryptio yn \u00f4l i ddata heb ei amgryptio. Mae Algorithmau Hash Diogel (SHA) yn algorithmau chwalu sy\u2019n cael eu defnyddio\u2019n gyffredin, fel SHA-256 sef algorithm cloddio protocol Prydain.<\/p>\n<h2>Pam bod cofrestru untro (SSO) yn boblogaidd?<\/h2>\n<p>Mae cofrestru untro (SSO) yn broses ddilysu sy\u2019n rhoi <a href=\"https:\/\/healthtechmagazine.net\/article\/2021\/10\/single-sign-solutions-help-achieve-efficient-clinician-workflows\">\u00a0<\/a><a href=\"https:\/\/healthtechmagazine.net\/article\/2021\/10\/single-sign-solutions-help-achieve-efficient-clinician-workflows\">profiad didrafferth i\u2019r defnyddiwr<\/a> gan fod llai o amser yn cael ei dreulio yn rhoi cyfrineiriau i mewn dro ar \u00f4l tro i\u2019r un defnyddiwr. Mae SSO yn golygu bod apiau yn gallu gweithio efo PayPal er enghraifft. Pan gaiff SSO ei greu rhwng amryw o ddarparwyr hunaniaeth gwahanol, caiff ei alw\u2019n ffederasiwn.<\/p>\n<p>Er bod SSO wedi cael ei fychanu dros y blynyddoedd, ar y cyfan, mae gweithredu SSO ar sail protocolau ffederasiwn yn gwella diogelwch, dibynadwyedd, gweithredu a phrofiadau i\u2019r defnyddiwr yn y pendraw.<\/p>\n<h2>Beth yw dilysu aml-ffactor (MFA)?<\/h2>\n<p>Mae dilysu aml-ffactor (MFA) yn golygu y bydd hacwyr yn dal i wynebu rhwystrau i fynd i mewn i gyfrif, er bod ganddynt eich cyfrineiriau.<\/p>\n<p>Mae\u2019r protocol dilysu ar gyfer MFA yn gofyn am gyflwyno dau ddarn o dystiolaeth, neu fwy. Gallai hyn fod yn rhywbeth y mae\u2019r defnyddiwr yn unig yn ei wybod (gwybodaeth), yn rhywbeth sydd gan y defnyddiwr yn unig (eiddo), neu\u2019n rhywbeth sy\u2019n nodweddu\u2019r defnyddiwr yn unig (yn gynhenid).<\/p>\n<p>Mae MFA yn broses ddilysu dau ffactor, ble mae angen cadarnhau ail ffactor. Fel arfer, daw hyn ar ffurf anfon cod untro a gynhyrchir ar hap (OTP) i ff\u00f4n symudol neu gyfrif e-bost, yn dibynnu ar beth yw eich prif ddyfais. Dim ond am gyfnod byr wedyn y gallwch ddefnyddio\u2019r cod. Caiff hyn ei ddefnyddio\u2019n gyffredin mewn gwasanaethau ariannol ochr yn ochr ag offer dilysu fel darllenwyr cardiau.<\/p>\n<h2>Pa brotocolau dilysu mae Microsoft ac Apple yn eu defnyddio?<\/h2>\n<p>Mae biometreg yn cael ei defnyddio mwy a mwy fel dulliau dilysu wrth reoli mynediad, gan gynnwys defnyddio olion bysedd, adnabod iris, adnabod llais, a chyflymder teipio hyd yn oed. Mae nodweddion dyfeisiau fel Macbooks ac iPhones wedi\u2019u diweddaru dros y blynyddoedd diwethaf i adnabod cyffyrddiad ac <a href=\"https:\/\/9to5mac.com\/2021\/08\/31\/iphone-how-to-use-face-id-with-mask\/\">adnabod wyneb<\/a> fel bod defnyddwyr yn gallu mynd i mewn i\u2019r dyfeisiau hyn yn gyflymach heb orfod teipio cyfrinair.<\/p>\n<p>Yn ddiweddar, mae Microsoft wedi cael gwared ar yr angen am gyfrinair i fewngofnodi i\u2019w apiau a\u2019i wasanaethau. Yn hytrach, mae ap dilysu o\u2019r enw <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/15\/the-passwordless-future-is-here-for-your-microsoft-account\/\">Windows Hello<\/a> yn darparu dyfais datgloi aml-ffactor sy\u2019n defnyddio cyfuniad o rif adnabod personol (PIN) ac adnabod wyneb neu olion bysedd. Gall hefyd ddefnyddio yr hyn a elwir yn \u201csignal dibynadwy\u201d fel ail ffactor datgloi drwy ddilysu eich cysylltiad Bluetooth, ffurfweddiad IP, neu WiFi.<\/p>\n<h2>Gyrfaoedd mewn seiberddiogelwch<\/h2>\n<p>Mae ein bywydau wedi mynd yn ddibynnol dros ben ar ein cysylltiad ar-lein ar gyfer gwaith, teulu a\u2019r byd ehangach. Gyda hynny, mae ein hangen am seiberddiogelwch a dulliau dilysu sydd amryw o gamau o flaen hacwyr wedi dod yn fwy o bryder.<\/p>\n<p>Bydd cwrs MBA mewn Seiberddiogelwch o Ysgol Reolaeth Gogledd Cymru yn rhoi\u2019r holl wybodaeth ddiweddaraf i chi am gryptograffeg, ac yn eich helpu chi i gadw ar flaen y gad o ran rheoli mynediad. <a href=\"https:\/\/online.wrexham.ac.uk\/mba-cyber-security\/\">Darllenwch fwy <\/a>am wneud cais nawr i ddiogelu dyfodol eich gyrfa.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wrth feddwl am gyfrineiriau cryf, y gamp yw creu rhywbeth cofiadwy ond eto heb fod yn amlwg. Ar ben hyn, mae cyfrineiriau unigryw fel arfer yn cynnwys cymysgedd o briflythrennau a llythrennau bach, rhifau a symbolau, sy\u2019n helpu i wella cryfder y cyfrinair. Felly, mae\u2019r siawns o gofio\u2019r cyfrineiriau ar yr adeg y byddwch chi &hellip; <a href=\"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/\">Continued<\/a><\/p>\n","protected":false},"author":13,"featured_media":1125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_daim_seo_power":"","_daim_enable_ail":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-1126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-erthyglau"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Diogelwch cyfrineiriau a systemau dilysu - Ysgol Reolaeth Gogledd Cymru<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/\" \/>\n<meta property=\"og:locale\" content=\"cy_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Diogelwch cyfrineiriau a systemau dilysu - Ysgol Reolaeth Gogledd Cymru\" \/>\n<meta property=\"og:description\" content=\"Wrth feddwl am gyfrineiriau cryf, y gamp yw creu rhywbeth cofiadwy ond eto heb fod yn amlwg. Ar ben hyn, mae cyfrineiriau unigryw fel arfer yn cynnwys cymysgedd o briflythrennau a llythrennau bach, rhifau a symbolau, sy\u2019n helpu i wella cryfder y cyfrinair. Felly, mae\u2019r siawns o gofio\u2019r cyfrineiriau ar yr adeg y byddwch chi &hellip; Continued\" \/>\n<meta property=\"og:url\" content=\"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/\" \/>\n<meta property=\"og:site_name\" content=\"Ysgol Reolaeth Gogledd Cymru\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-10T11:15:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-15T16:01:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/online.wrexham.ac.uk\/wp-content\/uploads\/2021\/11\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ruth Brooks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruth Brooks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 munud\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/\"},\"author\":{\"name\":\"Ruth Brooks\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/#\\\/schema\\\/person\\\/78a0572f5f1b0cd34114b7db2fce2ded\"},\"headline\":\"Diogelwch cyfrineiriau a systemau dilysu\",\"datePublished\":\"2021-11-10T11:15:24+00:00\",\"dateModified\":\"2023-08-15T16:01:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/\"},\"wordCount\":1384,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg\",\"articleSection\":[\"Erthyglau\"],\"inLanguage\":\"cy\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/\",\"url\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/\",\"name\":\"Diogelwch cyfrineiriau a systemau dilysu - Ysgol Reolaeth Gogledd Cymru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg\",\"datePublished\":\"2021-11-10T11:15:24+00:00\",\"dateModified\":\"2023-08-15T16:01:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/#\\\/schema\\\/person\\\/78a0572f5f1b0cd34114b7db2fce2ded\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#breadcrumb\"},\"inLanguage\":\"cy\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cy\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#primaryimage\",\"url\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg\",\"contentUrl\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg\",\"width\":800,\"height\":300,\"caption\":\"Person in a dark room on a laptop with a hologram showing a password login screen above\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/diogelwch-cyfrineiriau-a-systemau-dilysu\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Cartref\",\"item\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Diogelwch cyfrineiriau a systemau dilysu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/#website\",\"url\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/\",\"name\":\"North Wales Management School - Wrexham University\",\"description\":\"Rhaglenni gradd 100% ar-lein\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cy\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/#\\\/schema\\\/person\\\/78a0572f5f1b0cd34114b7db2fce2ded\",\"name\":\"Ruth Brooks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cy\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5942e6358ffa4077a6e89b185b9848be79842dcd0c792e94b7e62f49f2ffdfa1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5942e6358ffa4077a6e89b185b9848be79842dcd0c792e94b7e62f49f2ffdfa1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5942e6358ffa4077a6e89b185b9848be79842dcd0c792e94b7e62f49f2ffdfa1?s=96&d=mm&r=g\",\"caption\":\"Ruth Brooks\"},\"description\":\"Ruth Brooks is a content production specialist of more than 15 years\u2019 experience working in Australian and UK higher education. Ruth graduated from the University of South Australia (UniSA) with a Bachelor of Arts (Professional and Creative Communications) in 2007 and a Graduate Certificate in Marketing in 2015. Her experience spans the research, writing and editing of print and digital communications and marketing collateral for UniSA, as well as the creative development and design of a wide variety of visual communications including print publications and digital marketing assets for University College London. Today, Ruth works to produce and publish digital content that both informs and engages across an array of postgraduate subject areas, as well as web content in the higher education space.\",\"url\":\"https:\\\/\\\/online.wrexham.ac.uk\\\/cy\\\/author\\\/ruth-brooks\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Diogelwch cyfrineiriau a systemau dilysu - Ysgol Reolaeth Gogledd Cymru","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/","og_locale":"cy_GB","og_type":"article","og_title":"Diogelwch cyfrineiriau a systemau dilysu - Ysgol Reolaeth Gogledd Cymru","og_description":"Wrth feddwl am gyfrineiriau cryf, y gamp yw creu rhywbeth cofiadwy ond eto heb fod yn amlwg. Ar ben hyn, mae cyfrineiriau unigryw fel arfer yn cynnwys cymysgedd o briflythrennau a llythrennau bach, rhifau a symbolau, sy\u2019n helpu i wella cryfder y cyfrinair. Felly, mae\u2019r siawns o gofio\u2019r cyfrineiriau ar yr adeg y byddwch chi &hellip; Continued","og_url":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/","og_site_name":"Ysgol Reolaeth Gogledd Cymru","article_published_time":"2021-11-10T11:15:24+00:00","article_modified_time":"2023-08-15T16:01:06+00:00","og_image":[{"width":800,"height":300,"url":"https:\/\/online.wrexham.ac.uk\/wp-content\/uploads\/2021\/11\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg","type":"image\/jpeg"}],"author":"Ruth Brooks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruth Brooks","Est. reading time":"7 munud"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#article","isPartOf":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/"},"author":{"name":"Ruth Brooks","@id":"https:\/\/online.wrexham.ac.uk\/cy\/#\/schema\/person\/78a0572f5f1b0cd34114b7db2fce2ded"},"headline":"Diogelwch cyfrineiriau a systemau dilysu","datePublished":"2021-11-10T11:15:24+00:00","dateModified":"2023-08-15T16:01:06+00:00","mainEntityOfPage":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/"},"wordCount":1384,"commentCount":0,"image":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#primaryimage"},"thumbnailUrl":"https:\/\/online.wrexham.ac.uk\/wp-content\/uploads\/2021\/11\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg","articleSection":["Erthyglau"],"inLanguage":"cy","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/","url":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/","name":"Diogelwch cyfrineiriau a systemau dilysu - Ysgol Reolaeth Gogledd Cymru","isPartOf":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#primaryimage"},"image":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#primaryimage"},"thumbnailUrl":"https:\/\/online.wrexham.ac.uk\/wp-content\/uploads\/2021\/11\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg","datePublished":"2021-11-10T11:15:24+00:00","dateModified":"2023-08-15T16:01:06+00:00","author":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/#\/schema\/person\/78a0572f5f1b0cd34114b7db2fce2ded"},"breadcrumb":{"@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#breadcrumb"},"inLanguage":"cy","potentialAction":[{"@type":"ReadAction","target":["https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/"]}]},{"@type":"ImageObject","inLanguage":"cy","@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#primaryimage","url":"https:\/\/online.wrexham.ac.uk\/wp-content\/uploads\/2021\/11\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg","contentUrl":"https:\/\/online.wrexham.ac.uk\/wp-content\/uploads\/2021\/11\/Person-in-a-dark-room-on-a-laptop-with-a-hologram-showing-a-password-login-screen-above.jpg","width":800,"height":300,"caption":"Person in a dark room on a laptop with a hologram showing a password login screen above"},{"@type":"BreadcrumbList","@id":"https:\/\/online.wrexham.ac.uk\/cy\/diogelwch-cyfrineiriau-a-systemau-dilysu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Cartref","item":"https:\/\/online.wrexham.ac.uk\/cy\/"},{"@type":"ListItem","position":2,"name":"Diogelwch cyfrineiriau a systemau dilysu"}]},{"@type":"WebSite","@id":"https:\/\/online.wrexham.ac.uk\/cy\/#website","url":"https:\/\/online.wrexham.ac.uk\/cy\/","name":"North Wales Management School - Wrexham University","description":"Rhaglenni gradd 100% ar-lein","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/online.wrexham.ac.uk\/cy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cy"},{"@type":"Person","@id":"https:\/\/online.wrexham.ac.uk\/cy\/#\/schema\/person\/78a0572f5f1b0cd34114b7db2fce2ded","name":"Ruth Brooks","image":{"@type":"ImageObject","inLanguage":"cy","@id":"https:\/\/secure.gravatar.com\/avatar\/5942e6358ffa4077a6e89b185b9848be79842dcd0c792e94b7e62f49f2ffdfa1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5942e6358ffa4077a6e89b185b9848be79842dcd0c792e94b7e62f49f2ffdfa1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5942e6358ffa4077a6e89b185b9848be79842dcd0c792e94b7e62f49f2ffdfa1?s=96&d=mm&r=g","caption":"Ruth Brooks"},"description":"Ruth Brooks is a content production specialist of more than 15 years\u2019 experience working in Australian and UK higher education. Ruth graduated from the University of South Australia (UniSA) with a Bachelor of Arts (Professional and Creative Communications) in 2007 and a Graduate Certificate in Marketing in 2015. Her experience spans the research, writing and editing of print and digital communications and marketing collateral for UniSA, as well as the creative development and design of a wide variety of visual communications including print publications and digital marketing assets for University College London. Today, Ruth works to produce and publish digital content that both informs and engages across an array of postgraduate subject areas, as well as web content in the higher education space.","url":"https:\/\/online.wrexham.ac.uk\/cy\/author\/ruth-brooks\/"}]}},"_links":{"self":[{"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/posts\/1126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/comments?post=1126"}],"version-history":[{"count":0,"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/posts\/1126\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/media\/1125"}],"wp:attachment":[{"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/media?parent=1126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/categories?post=1126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/online.wrexham.ac.uk\/cy\/wp-json\/wp\/v2\/tags?post=1126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}