L kout Initiative Choosing a Strong Password Office of Information Technology.

Slides:



Advertisements
Similar presentations
Career Unit RESUMES. Questions to think about… What is a resume? Why would you want to have one? Is there more than one type of resume? How do I make.
Advertisements

Developed by Mary Ellen Copeland, PhD
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Facebook Part I Building Your Profile Patrick Therrien Technology & Education Training Specialist.
0 - 0.
Addition Facts
1 Learning Touchmath *Graphics taken from
… lifelong learning! Centre for Geoinformatics | Salzburg University | Dr. Hermann Klug | Senior Researcher & Project Manager |
Phishing, what you should know L kout Initiative.
Shapes and Designs Inv. 1.3: Tiling Activity.
Case Management Techniques
LPISD Technology Update Technology Work Orders When should you submit a Technology Work Order? Moving technology equipment Issues with the LPISD.
Phishing, what you should know L kout Initiative Office of Information Technology.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Addition 1’s to 20.
1 Community Alcohol Partnership Age-Restricted Sales Training & Support.
25 seconds left…...
Test B, 100 Subtraction Facts
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Week 1.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Noun Clauses beginning with a Question Word Chapter 14 – Noun Clauses ( question word and if/whether clauses)
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
K-2. Today’s Objective: I will create a strong, private password.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
1 Safely Using Shared Computers Amanda Grady December 2013.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
How can a secure password help you protect your private information? Strong Passwords Hueneme Elementary School District Digital Citizenship 4th Grade.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
To Introduction cyber safety Grids for Kids – January 2008 Written by Donna Cobrin.
“L  kout” Initiative Choosing a Strong Password.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Must be at least 8 characters long Must contain at least one of each of the following: Uppercase letter Lowercase letter Number Special Character.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
By :Mitchell Christie by :Mitchell Christie safety.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
WINTER Template 01 to Introduction Cyber Safety Introduced by Donna Cobrin.
Username Usage and Password Security. Username Usage.
Understanding Security Policies Lesson 3. Objectives.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
PASSWORD SECURITY A Melbourne Athenaeum Library
Key words: Secure | Password | Character
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Information Systems Desktop Support
Choosing a Strong Password
Choosing a Strong Password
Keep It Safe! Secure Your Secrets
Protecting Your Password
Choosing a Strong Password
Safe, secure and empowered
Presentation transcript:

L kout Initiative Choosing a Strong Password Office of Information Technology

2 Important Note The information published hereafter is just a collection of selected IT industry best practices and tips that might assist you in improving the security levels against computer related threats while exercising your computing activities. The information published hereafter is not meant in any way to provide a comprehensive solution nor to ensure full protection against computer related threats.

3 Office of Information Technology Choosing Good Passwords > Weak passwords are one of the most common reasons for identity theft and access to your or your organization information. > When choosing a password, make it as difficult as possible for someone to guess but as easy as possible for you to remember.

4 Office of Information Technology The DONTs in password construction > DO NOT construct a password based on your login name in any form > DO NOT construct a password based on biographical information about yourself or your family members such as: Names of family members Birthdates or important events IDs (social security number or driving license number)

5 Office of Information Technology > DO NOT construct passwords based on your telephone number, the brand of your automobile, the name of the street you live on, etc. > DO NOT construct passwords based on your favorite pets name. > DO NOT construct passwords based on your friends names, or favorite star, etc. The DONTs in password construction

6 Office of Information Technology The DONTs in password construction > DO NOT construct passwords with words that can be found in a standard dictionary (English or foreign) or are publicly known slang or jargon. > DO NOT construct passwords that are based on publicly known fictional characters from books, films, and so on. > DO NOT construct passwords based on the companys name or geographic location.

7 Office of Information Technology > DO NOT construct a password using a word identified in the previous bullet points that is reversed, rearranged, doubled, or even mirrored. > DO NOT construct a password using a word identified in the previous bullet points event if you substitute certain numerals for characters they look like (0 instead of an o and 1 instead of an l or I). Example: pa$$w0rd. > DO NOT construct a password using popular patterns like xyz or qwerty The DONTs in password construction

8 Office of Information Technology > DO construct passwords that contain at least 6 characters. > DO construct passwords that start with a letter. > DO construct passwords that contain at least one uppercase letter (e.g. N) and 3 lowercase letters (e.g. t). > DO construct passwords that contain at least one numerical character (e.g. 5). The DOs in password construction

9 Office of Information Technology The DOs in password construction > DO construct passwords that contain at least one special character such as ! if the application server permits. > DO select a new password that contains at least 4 characters that are different than those found in the old password you are replacing.

10 Office of Information Technology The DOs in password construction > DO construct a password that is easy to remember. > DO construct a password that you can type quickly, without having to look at the keyboard. This makes it harder for someone to steal your password by watching over your shoulder. > DO construct a password that is hard to guess even by someone who knows you well.

11 Office of Information Technology Putting Theory to Practice Example 1: Pick a sentence that reminds you of the password. What time is my accounting class in Nicely 204? WtimaciN2o4 If my car makes it through 2 semesters, I'll be lucky imCmit2s,Ibl

12 Office of Information Technology Putting Theory to Practice Example two: Be creative with your passwords I miss you = nohss!w! I feel great= If33lg8! Wildcats are #1 = W!ldcatzR#1

13 Office of Information Technology Putting Theory to Practice Example three: Using Lebanese Language in your passwords >Shee_te32eeed! >3aseer3nab

14 Office of Information Technology Putting Theory to Practice Example four: Use every day words. Add characters. Misspell one or both words. >Friendship=Fr13nd+ch1p >Lifelong=Layfl000ng >Teddybear=T3deBaRe

15 Office of Information Technology Putting Theory to Practice Example five: Alter numbers >1014=tenfourteen >1014=tenf.our >1014=oneOone4 >1014= wnOwn4 >1014=Tn.4.Tn >1014=tnfrtn24 (10+14= 24)

16 Office of Information Technology Putting Theory to Practice Good reference:

17 Office of Information Technology Acknowledgements >Office of Information Technology team >Work-Study students: Marwa Abdul Baki Donna Bazzi >