names of close relatives and the date when they married can also be used. This can be vulnerability because individuals are given opportunities to guess accounts password and use them(Bishop

2003:68).