Passwords.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Getting Started with Microsoft Office 365. Getting Started - Overview How to use your existing desktop software to connect to Office 365. Install the.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
® Microsoft Office 2010 Appendix A: Introduction to SkyDrive and Office Web Apps.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
Microsoft Office Illustrated Using Advanced Features.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Maryknoll for Students. Step 1: YOUR INFORMATION!  Your User Name: Last name + 1 st name initial + year graduating (last 2 digits) Example: marsb.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Three Layer Architecture Why Bother with the Middle Layer?
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Access resources in a federation partner organization.
Twenty-Minute Tech Tips A presentation about Diigo and how it can increase your productivity! Beth Given 15 th November 2008.
This Guide demonstrates how to setup the Client initially.
A single Workspace for all your apps Using any device with a browser.
Elements and Attributes. XHTML Elements The element contains special information that does not necessarily show up on the web page. The element determines.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
1 Tech Tuesday: Setting up Emai content/uploads/2015/06/PRC- TechTuesday-SettingUp .pptxhttp://pbdd.org/wp- content/uploads/2015/06/PRC-
By Jimmy Segretto. Explain what an authenticator is. Why should I use one? How does it work? Different kinds of authenticators. Companies who use Authenticators.
CREATING PASSWORD SAFETY By: Kyra Scoby-Hamilton.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Classic & Old Mopar’s Cars for Sale at Moparsonsale.com
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
IT Security Awareness Day October 19, 2016
What Is Tapestry? An Online learning journal system.
Setting and Upload Products
Introduction to Web Safety
Better passwords ~ BETTER SECURITY SAI PRASAD SETTY
The advantages and the disadvantages of working in the cloud.
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
Cloud Computing.
Ways to protect yourself against hackers
Safe Internet Mechatronika Budapest.
Unit 12 Using the Internet & Browsing the Web
Two-factor authentication
What Home Computer Skills do I need
How can we keep our information safe?
What Is Tapestry? An Online learning journal system.
Internet Safety By Ruby.
Importance of Privacy Internet Safety
Environmental Science: Everything Is Connected
Appendix A: Introduction to SkyDrive and Office Web Apps
Pictures and cars.
Unit 7 NT1330 Client-Server Networking II Date: 7/26/2016
Web Systems Development (CSC-215)
Social Networks.
What Is Tapestry? An Online learning journal system.
October is National Cyber Security Awareness Month
Passwords.
Digital Citizenship EIT, Author Gay Robertson, 2017.
Student Experience It’s your education.
What Home Computer Skills do I need
Keep It Safe! Secure Your Secrets
What Is Tapestry? An Online learning journal system.
Online Safety Assembly 2019
Zachary blum Sam Garcia Courtney Sullivan
Procedure for adding a Trusted Site
Embedding Videos Into PowerPoint
Digital Citizen.
Social Media Safety.
Keeping Our Data Secure
Indeed.com Creating an account.
Hazelwood Schools Wednesday 2nd October 2019.
Presentation transcript:

Passwords

What makes a strong password? https://howsecureismypassword.net/ © eLIM – All Rights Reserved

Method One Think of your favourite song and a line from it “We all live in a yellow submarine” Take the first letter of each word “Waliays” Add a number and a character “Waliays4!” © eLIM – All Rights Reserved

Method Two Think of three unconnected words Dog car swing String these together “Dogcarswing” You can change some letters for numbers and add punctuation D0gcarswing! Think of a phrase to remember or draw pictures to remember “The dog who owned a car was on a swing” © eLIM – All Rights Reserved

Which was the best method for you? Which was best Which was the best method for you?

What rules should you have about your password? © eLIM – All Rights Reserved

Synchronising devices If you use a platform across devices you can make sure that they have the same data. We are going to do this with Firefox - web browser

Another way - Cloud services ‘In the cloud’ - saved on a company's server and accessible from any web enabled device

Extra Security 2 Factor Authentication Adding another layer of protection on accounts with a temporary password

2 Factor Authentication Video

Snapchat and 2 Factor

Facebook and 2 Factor

And then follow the instructions YouTube and 2 Factor And then follow the instructions

Next Steps What are the steps that they going to take? What advice would they give to their families?