PASSWORD SECURITY A Melbourne Athenaeum Library

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Password Management PA Turnpike Commission
1 Safely Using Shared Computers Amanda Grady December 2013.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Protecting Your Personal Information November 15, 2013.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
“L  kout” Initiative Choosing a Strong Password.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
PUBLIC COMPUTER SAFETY
2.4 Cyber-Safety.
IT Security Awareness Day October 19, 2016
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Fraud protection.
What this activity will show you
Identity on the Internet
Dove science academy Cyber Club
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Password strength Dr. X.
Chapter One: Mastering the Basics of Security
Password Protection: How Safe Are Your Passwords?
Ways to protect yourself against hackers
© 2015 Air Force Association
3.6 Fundamentals of cyber security
Strong passwords easy to remember
Password Cracking Lesson 10.
Choosing a Strong Password
Protecting your personal information and privacy
Passwords.
DOVE SCIENCE ACADEMY CYBER CLUB
Setting up an online account
Unit 1.6 Systems security Lesson 4
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
2.4 Cyber-Safety.
Choosing a Strong Password
Lesson 2: Epic Security Considerations
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Chapter 3: Protecting Your Data and Privacy
Keep It Safe! Secure Your Secrets
what I know now about passwords…
Choosing a Strong Password
Internet Safety – Social Media
Passwords Why all the bother?.
Password Awareness.
Presentation transcript:

PASSWORD SECURITY A Melbourne Athenaeum Library Image source: https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703 A Melbourne Athenaeum Library Cybersafety Information Guide Image source: https://pixabay.com/en/password-keyword-codeword-solution-397657

Why use passwords? One of the most common and effective ways to make it difficult to access your files and information is to use a password. A good password protects you from many threats including fraud, theft, identity theft, and general invasions of privacy. Image source: https://pixabay.com/en/enter-sign-password-membership-1643453/ Image source: https://pixabay.com/en/enter-sign-password-membership-1643453

Password dos and don’ts Do choose a strong password. Do use different passwords for different accounts and applications. Do change your password regularly. Don’t store your passwords on your browser. Don’t use obvious passwords such as your surname, first name, nickname, birthdate. Don’t reveal passwords to others.

Weak passwords Weak passwords such as abc123, qwerty, 12345, password and letmein are easy to remember and easy to crack! Image source: https://pixabay.com/en/password-reminder-post-note-sticker-1433096/ Passwords that contain personal information about you or your family and friends are also considered weak. Image source: https://pixabay.com/en/password-reminder-post-note-sticker-1433096

Strong passwords Unique Don’t use famous quotes or reuse previous passwords. Also try to use different passwords for different accounts. Long For many websites the minimum length is 8 characters. If you think you will be able to remember it, a longer password (12 to 16 characters) is often recommended. Not a word It doesn’t matter whether it is an English word or in another language. Anonymous This cannot be emphasised enough. Nobody should be able to guess your password because they’ve researched you. Memorable Some tips for making memorable passwords are listed at: http://www.makeuseof.com/tag/7-ways-to-make-up-passwords-that-are-both-secure-memorable/

Additional security There are currently three common ways to make your devices and accounts more secure: Passphrases are a different way of making hard to crack passwords which are easier to remember. Multifactor authentication uses at least two methods of identification, often a password and a code sent to a mobile device. Password managers store and manage many different passwords for you.

Passphrases Passphrases are created by combining random words such as CorrectHorseBatteryStaple, rather than a combination of words, numbers, and symbols. The important thing to remember with a passphrase is that the words must be random. Even though they might be common words and therefore easy to remember much of the strength comes from the fact that they are unrelated to each other. To help get truly random words, there have been a number of lists created that allow you to generate passphrases by rolling dice. These are known as Diceware. More information about using Diceware to create passphrases is available at: http://world.std.com/~reinhold/diceware.html

Multifactor identification A security method that uses at least two means of identification, eg: A password. An additional code sent to a device. A physical token which must be connected. Biometric information such as fingerprint scanning. A common example of this is the ATM which is only accessible through the correct combination of bank card and password. The most common method for online multifactor identification is the password and code system, usually with the code sent to the user’s mobile phone number.

Password managers Another way to make managing your passwords easier is to use a password manager, some examples of these include: LastPass – https://www.lastpass.com/ Dashlane – https://www.dashlane.com/ KeePass – http://keepass.info/ 1Password – https://1password.com/ There are many more available by searching for ‘password manager’ in your preferred search engine. These services Store your passwords securely. Import passwords from you browser. Rate your passwords. Generate random passwords. Make your passwords available across your devices. Can autofill forms, etc.

A final warning We have used a number of password examples in this presentation. Don’t ever reuse a password that has been used as an example of a strong password because these will be among the first tried when attempting to crack it. Image source: https://en.wikipedia.org/wiki/File:Mauritius_Road_Signs_-_Warning_Sign_-_Other_dangers.svg Image source: https://en.wikipedia.org/wiki/File:Mauritius_Road_Signs_-_Warning_Sign_-_Other_dangers.svg

Thank you Thank you for taking the time to read this guide. If you have any further queries please don’t hesitate to ask library staff. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.