Password AL-Salman Mohammed Mohammed Ali Rayan Rasheed.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

To get to the moodle site the first thing you want to do is to go to the Great falls Public Schools Web site. Once you arrive here, you will want to click.
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Tips: * Just delete the page you don’t like. * Save the page you want only before submit to us.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
Password Cracking By Allison Ramondetta & Christine Giordano.
Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
ONE® Pages Training Presentation North York General Hospital.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
Understanding Security Policies Lesson 3. Objectives.
How to create a Google Website For Teachers. 1.Create a class account for students to access Google resources at: 2. Instruct.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
SCHOLARSHIPS You wont get scholarships if you don’t apply for them…
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
CREATING PASSWORD SAFETY By: Kyra Scoby-Hamilton.
Understanding Security Policies
Introduction to Computer Facilities
Key words: Secure | Password | Character
Chapter 6 – Users, Groups, and Permissions
Dove science academy Cyber Club
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Using iLocker.
I have edited and added material.
Secure Software Confidentiality Integrity Data Security Authentication
HOW TO CHANGE DLINK WIRELESS PASSWORD.
Networks Encryption.
Big Picture How many ways can a system be attacked? What can we do about it?
Navigating the Internet
Lesson 2- Protecting Yourself Online
Information Technology Services Education and Awareness Team
DOVE SCIENCE ACADEMY CYBER CLUB
GSBS IT Resources and Security
ONE® Pages Training Presentation
Computers Vocabulary.
Passwords.
Internet safety By DAGAS YACMAS team.
19 Dec.2010-Self Controlling-Ali Mohamed
Keep It Safe! Secure Your Secrets
Security.
Information Technology Services Education and Awareness Team
Intrusion.
Information Systems Security and You
Lesson 2- Protecting Yourself Online
Router configurations setting
Passwords Why all the bother?.
Security in mobile technologies
Computer Security Damian Gordon.
Keeping your passwords safe
Password Security.
Presentation transcript:

Password AL-Salman Mohammed Mohammed Ali Rayan Rasheed

Presentation outline Definition for password. where we use the password. The ways to detect the password. How to create a difficult password. How to protect your password. Top list of passwords 2015.

Password Password: is a set of secret characters or words utilized to gain access to: 1- Computer 3-Data 2- Smartphone 4-Programs 2- Web page 5-WI-FI

Password The ways to detect the password: Crack weak password Social Engineering By sniffer programs

Crack the weak password: 1- Dictionary 2- Brute Force Attack is (E3) Example: If the password AA, AB, AC…AZ, A0, A1, A2…A9,BA, BB, BC…BZ, B0, B1, B2…B9....EA, EB, EC…EZ, E0, E1, E2, E3

Crack the weak password

Password Social Engineering

Password Sniffer programs

Password How to create a storing password? 1- Not less than 10 characters. 2- mixture of letters, numbers and symbols. Letters: A,B,a,b….. Numbers:1,2,3,4…. Symbols:` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? / 3- Don’t use one word

Password How to save your password from being stolen ?)Tips( 1- Don't make password the same as the username. 2- Don't write password on paper. 3- Don’t use one password for all your accounts. 4- Don’t save your password on files in your accounts.

Password Top list of passwords 2015

Questions?

References: Security Fundamentals, TVTC. http://forums.egynt.net/t9419.html TeamsID https://www.teamsid.com/worst-passwords-2015/

Thank you