Password strength Dr. X.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Authentication and Constructing Strong Passwords.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Today’s Objective: I will create a strong, private password.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
Password Management PA Turnpike Commission
Staying Safe Online Keep your Information Secure.
CIS 450 – Network Security Chapter 8 – Password Security.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
Protecting Your Password
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
PASSWORD PROTECTION  Your passwords should never, ever be shared with anyone except for your parents.  Try to make your passwords tough to guess with.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Technological Awareness for Teens and Young Adults.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
2.4 Cyber-Safety.
PASSWORD SECURITY A Melbourne Athenaeum Library
IT Security Awareness Day October 19, 2016
Dove science academy Cyber Club
Protecting What’s Yours: Your Identity
Password Management Limit login attempts Encrypt your passwords
Password Security by Jordan D. v2.0
Keep it private.
Passwords.
Security.
Information Technology Services Education and Awareness Team
DOVE SCIENCE ACADEMY CYBER CLUB
Passwords.
R E A D What is cyber bullying? Hall
2.4 Cyber-Safety.
Keep It Safe! Secure Your Secrets
Security.
Protecting Your Password
Creating Passphrases Include Examples NOT REQUIRED
E SAFETY ASSEMBLY.
Exercise: Hashing, Password security, And File Integrity
Information Technology Services Education and Awareness Team
Company Name | Phone Number | Website | Address
Keeping your passwords safe
Hazelwood Schools Wednesday 2nd October 2019.
Presentation transcript:

Password strength Dr. X

Logistics Project: Declare your teams! Proposal presentations on Feb. 16!!! Homework due on Feb. 14

What makes a strong password? Length? Special characters? Numbers?

https://xkcd.com/936/

Websites that measure your password strength https://howsecureismypassword.net/ http://www.passwordmeter.com/ Use these two sites with as many passwords as you can use in 5 mins. Report your observations. What makes a strong password? Should you trust these websites and put your real password…?

Password managers LastPass: https://www.lastpass.com/ Dashlane: https://www.dashlane.com/ Use two factor authentication Keep some passwords in your head: A couple of important email addresses Banking

How do we protect passwords? Hashing We need to save passwords. Why? If we save passwords like this: Is that safe?

Hashing explained If your database looks like this: Can you guess the password? Possibly… Add some salt: random numbers, letters More difficult Add two factor authetication...

Hashing explained https://www.youtube.com/watch?v=--tnZMuoK3E Dictionary attack Brute force attack

Tips for good passwords Never use a dictionary word Avoid using your pet’s name, parent name, your phone number, driver’s license number or anything which is easy to guess. Avoid using passwords with sequence or repeated characters: For Ex: 1111111, 12345678 or qwerty, asdfgh. Password dress: http://lorrie.cranor.org/blog/wp- content/uploads/2013/12/IMG_5014.jpg

One more piece of advice Change password often… The more time a hacker has, they may find your password Change your password especially if you hear about compromised sites/social media etc.