Better passwords ~ BETTER SECURITY SAI PRASAD SETTY

Slides:



Advertisements
Similar presentations
Department of Management Services People First People First On-Line Password Reset Process and New Password Requirements Production Release on April 12,
Advertisements

 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
THAT STRANGER IS NOT YOUR FRIEND Facebook 101:. Housekeeping This presentation is not exhaustive It is just enough information to get you started; making.
Click here for getting your Student User Id & password.
Pre-enrolment. If you have not yet performed pre-enrolment procedures before, you can do it now using this function.
Comparative Advantage and Trade Lesson 1.4. Gains From Trade We all benefit from Trade, simply because we cannot do everything ourselves. Not only does.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
How to safely use Facebook. Ken Loveday. TIPS FOR PROTECTING PERSONAL INFORMATION FACEBOOK LOGIN  Required Info  Name   Password  Birthday.
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
2 nd Grade.  ______ make passwords eight or more characters long.
WEBSITES AND ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou.
5.2 Verifying Identities. What is an identity? Guidelines for Verifying Identities 1.Work with one side of the equation at a time. Use the more complicated.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Properties of Addition & Multiplication. Before We Begin… What is a VARIABLE? A variable is an unknown amount in a number sentence represented as a letter:
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Do as many as you can in 5 minutes ,000,
Chris Calderon – February 2016 MIS 534 Information Security Management.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Access Account Activation and Electronic Signature Web Application.
What do you do when you do these jobs. Be creative! Save people and animals! Save lives! Help catch the bad guys!
11 | Managing User Info Jeremy Foster Michael Palermo
SOLVING ONE-VARIABLE EQUATIONS •. Goal: Find the one value
Goodbye to Passwords.
Password Protection: How Safe Are Your Passwords?
Properties of Arithmetic
Production Vs Practice Lab
Outline What does the OS protect? Authentication for operating systems
Online Safety.
Outline What does the OS protect? Authentication for operating systems
Lesson 2-1 Properties of Numbers.
Solving Linear Inequalities
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Welcome MyCelium phone number MyCelium phone number.
Two Way Authentication
Leveraging the Power of Likes, Hashtags & Shares
Helpful Tips and Tricks for Reading in World History
Objective: Be able to add and subtract directed numbers.
Scalars Some quantities, like temperature, distance, height, area, and volume, can be represented by a ________________ that indicates __________________,
L1-6 Notes: Algebra: Variables and Expressions
Two Factor Authentication
Passwords.
GLOBALIZATION.
Strong Password Authentication Protocols
Business Studies Answer Planner
Is Facebook safe? Your privacy on Facebook can be threatened in different ways. Many people are already aware of the fact that not all on Facebook are.
Inequalities and the Number Line
DSD 101: Tips, Tools, and Best Practices to Stay Safe Online
Passwords.
what I know now about passwords…
start to finish – November 20181
Facebook Facts. Paid Advertising. Facebook Live Analytics.
Mean & Standard Deviation
Personal Purpose Family Work Social Spiritual The idea:
Gmail Password Recovery
How to achieve positive online reviews
DEALING WITH THE MEDIA.
Digital Citizen.
1.2 Commutative, Identity, and Associative Properties
Remember – You MUST write in PARAGRAPHS
you get to solve puzzles!
Trigonometric Identities
Chapter Goals Discuss the CIA triad
Warm up #2 Ch 1: SIMPLIFY if possible
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Better passwords ~ BETTER SECURITY SAI PRASAD SETTY FLORIDA IT CAREER ALLIANCE

Overview Identity verification What is a password? Bad passwords Better passwords Best passwords

The process of verifying identity is called “AUTHENTICATION” How do we verify? 3 WAYS 1.SOME THING YOU ARE 2.SOME THING YOU HAVE 3.SOME THING YOU KNOW The process of verifying identity is called “AUTHENTICATION”

Some thing you are!! BIOMETRICS

Some thing you have

Some thing you know Combination of words, letters, special symbols. Answers to security questions Personal information

What we usually do? USING SINGLE AUTHENTICATION MECHANISM USING COMBO OF TWO AUTHENTICATION MECHANISMS Example 1 Example 2

Why PASSWORDS? ADVANTAGES: CHEAP

Why they have to be secure

How to build a better password? CATCHING vs SECURE TRADE OFF

HAMMING DISTANCE is simply the number of changes made FINDINGS HAMMING DISTANCE IN PASSOWRDS password123 p@$$word!23 4 HAMMING DISTANCE is simply the number of changes made

passwords Add a mnemonic password : p@$$word!23 password with mnemonic : p@$$word!23crawfish MNEMONIC is an idea or an association that helps in remembering something

Passwords across multiple accounts Password for Google and Facebook accounts : googlep@$$word!23# f@cebookp@$$word!23#

A Tough password @MeRIc@ningodtRU$t

Tips 1.Build your custom password for everything. 2. Change it using above said policies atleast for 6 months.

Questions?