CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, 10231975,

Slides:



Advertisements
Similar presentations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Advertisements

Music: Nightengale Serenade Friendship Bouquet.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON
Johnson Logistics Solutions Office of Systems and Information Technology.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
Passwords They can be easy but very difficult to crack.
K-2. Today’s Objective: I will create a strong, private password.
Information Security and Cybercrimes
1. 2 Overview of AT&T EPIC Ordering Process for SUS (Supply Order) Suppliers 1.AT&T User creates shopping cart on internal web-based portal 2.Shopping.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Password Management PA Turnpike Commission
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
e-ID Your Key to Technology at SIUE Your e-ID and associated password are your access to multiple systems across campus and will be required during your.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Don’t forget to add the conjunction and to the last word in your list!
Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
Protecting Your Password
By. Sierra Gillette. Acceptable Use  Abiding by the policies and procedures of other networks that are accessed  Being polite and using appropriate.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Variable: Is a quantity that can change or vary. Mathematicians use letters to represent variables. Constant: A quantity that does not change x.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
11 SECURITY PLANNING AND ADMINISTRATIVE DELEGATION Chapter 6.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
A Guide to Using SMART eR Online Ordering (Electronic Requisitions) Managing Employee Timeoff, Electronic W-2s, Etc… 1.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
CREATING PASSWORD SAFETY By: Kyra Scoby-Hamilton.
Communicating safely and appropriately online. Why do we need passwords?
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Communicating safely and appropriately online
K-W’s Kindergarten Calendar Week of January 9th-13th
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
SECURITY PLANNING AND ADMINISTRATIVE DELEGATION
Technology for Tomorrow
PASSWORDS Unique is Good.
Things To Avoid: 1-Never your password to anyone.
2017 TCS SMT Training - Dallas
Passwords.
Student Passwords.
Cybersecurity and Economics
what I know now about passwords…
start to finish – November 20181

Digital Citizen.
E-LEARNING SOURCES IN COMPUTER NETWORKS SECURITY
Keeping Our Data Secure
Keeping your passwords safe
Presentation transcript:

CREATING A STRONG PASSWORD

PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, , etc) Common phrases or grouped words (newyorkcity) Do not use symbol as some products cannot process passwords with symbol

STRONG PASSWORD LOGIC Minimum of eight characters Alternate between upper and lower case letters Substitute numbers and/or symbols for some of the letters Consider passPhrases rather than passWords INSECURE = helpdesk or helpdesk1 SECURE = helpdesk support is h3lpdesksUPP0rt

REMEMBERING YOUR PASSWORD There are several good ways to remember your password and to work numbers into them. Use mnemonics - mental tricks to help you remember important things. For example, the sentence. Or "I Go To Bed At 11 PM" becomes ig2ba11pm. Or "I Am Too Smart For My Own Good" becomes ia2s4mog.

KEEPING YOUR PASSWORD PRIVATE Do not leave a written copy of your password anywhere near your computer Do not share with your friends If you forget your password, it can be reset

HOW STUDENTS UPDATE PASSWORDS On a Windows Device CNTRL>ALT>DELETE