Choosing a Strong Password

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

L kout Initiative Choosing a Strong Password Office of Information Technology.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
K-2. Today’s Objective: I will create a strong, private password.
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
1 Safely Using Shared Computers Amanda Grady December 2013.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
How can a secure password help you protect your private information? Strong Passwords Hueneme Elementary School District Digital Citizenship 4th Grade.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
To Introduction cyber safety Grids for Kids – January 2008 Written by Donna Cobrin.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
“L  kout” Initiative Choosing a Strong Password.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
By :Mitchell Christie by :Mitchell Christie safety.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
WINTER Template 01 to Introduction Cyber Safety Introduced by Donna Cobrin.
Username Usage and Password Security. Username Usage.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Understanding Security Policies Lesson 3. Objectives.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
7/10/20161 Computer Security Protection in general purpose Operating Systems.
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
PASSWORD SECURITY A Melbourne Athenaeum Library
Understanding Security Policies
Why is this called “the ostrich effect”?
Key words: Secure | Password | Character
Dove science academy Cyber Club
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Common Methods Used to Commit Computer Crimes
Protecting What’s Yours: Your Identity
Ways to protect yourself against hackers
Information Systems Desktop Support
Phishing, what you should know
Choosing a Strong Password
DOVE SCIENCE ACADEMY CYBER CLUB
Introduction to Computers
Keep It Safe! Secure Your Secrets
Protecting Your Password
what I know now about passwords…
Choosing a Strong Password
Computer Security Protection in general purpose Operating Systems
Safe, secure and empowered
INDUCTION & ORIENTATION to il&fs Technologies ltd
Presentation transcript:

Choosing a Strong Password “Lkout” Initiative Choosing a Strong Password

Important Note The information published hereafter is just a collection of selected IT industry best practices and tips that might assist you in improving the security levels against computer related threats while exercising your computing activities. The information published hereafter is not meant in any way to provide a comprehensive solution nor to ensure full protection against computer related threats.

Choosing Good Passwords Weak passwords are one of the most common reasons for identity theft and access to your or your organization information. When choosing a password, make it as difficult as possible for someone to guess but as easy as possible for you to remember.

The DON’Ts in password construction DO NOT construct a password based on your login name in any form DO NOT construct a password based on biographical information about yourself or your family members such as: Names of family members Birthdates or important events IDs (social security number or driving license number)

The DON’Ts in password construction DO NOT construct passwords based on your telephone number, the brand of your automobile, the name of the street you live on, etc. DO NOT construct passwords based on your favorite pet’s name. DO NOT construct passwords based on your friends names, or favorite star, etc.

The DON’Ts in password construction DO NOT construct passwords with words that can be found in a standard dictionary (English or foreign) or are publicly known slang or jargon. DO NOT construct passwords that are based on publicly known fictional characters from books, films, and so on. DO NOT construct passwords based on the company’s name or geographic location.

The DON’Ts in password construction DO NOT construct a password using a word identified in the previous bullet points that is reversed, rearranged, doubled, or even mirrored. DO NOT construct a password using a word identified in the previous bullet points event if you substitute certain numerals for characters they look like (0 instead of an “o” and 1 instead of an “l” or “I”). Example: “pa$$w0rd”. DO NOT construct a password using popular patterns like “xyz” or “qwerty”

The DOs in password construction DO construct passwords that contain at least 6 characters. DO construct passwords that start with a letter. DO construct passwords that contain at least one uppercase letter (e.g. N) and 3 lowercase letters (e.g. t). DO construct passwords that contain at least one numerical character (e.g. 5).

The DOs in password construction DO construct passwords that contain at least one special character such as “!” if the application server permits. DO select a new password that contains at least 4 characters that are different than those found in the old password you are replacing.

The DOs in password construction DO construct a password that is easy to remember. DO construct a password that you can type quickly, without having to look at the keyboard. This makes it harder for someone to steal your password by watching over your shoulder. DO construct a password that is hard to guess even by someone who knows you well.

Putting Theory to Practice Example 1: Pick a sentence that reminds you of the password. What time is my accounting class in Nicely 204? WtimaciN2o4 If my car makes it through 2 semesters, I'll be lucky imCmit2s,Ibl

Putting Theory to Practice Example two: Be creative with your passwords I miss you = nohss!w! I feel great = If33lg8! Wildcats are #1 = W!ldcatzR#1

Putting Theory to Practice Example three: Using Lebanese Language in your passwords Shee_te32eeed! 3aseer3nab

Putting Theory to Practice Example four: Use every day words. Add characters. Misspell one or both words. Friendship = Fr13nd+ch1p Lifelong = Layfl000ng Teddybear = T3deBaRe

Putting Theory to Practice Example five: Alter numbers 1014 = tenfourteen 1014 = tenf.our 1014 = oneOone4 1014 = wnOwn4 1014 = Tn.4.Tn 1014 = tnfrtn24 (10+14= 24)

Putting Theory to Practice Good reference: http://www.wikihow.com/Remember-Your-Password

Acknowledgements Computing and Networking Services team. Work-Study students: Marwa Abdul Baki Donna Bazzi www.CartoonStock.com