Passwords Why all the bother?.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Subtitle Version or Date Presentation TitleIntroduction to using BCeSIS Module 2.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Protecting Your Identity: What to Know, What to Do.
Identity Theft: Protect Yourself. Overview Understand ID theft and how it happens Protect your computer Strong passwords Commonsense precautions.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Jing Cast for Creation of a Professional Gmail Account By Matt Chonka EDTC6432: Essentials of Computer Authoring.
How to Login into SSA ?. Home Page Click on My Profile.
Today’s Objective: I will create a strong, private password.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Textual Password How to use the Textual Authentication Model (AC)
Security Compact.  Only authorized security administrators shall be allowed to create a user account for the PowerSchool application.  The LEA security.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Protecting Your Password
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Confidentiality, Integrity, Awareness What Does It Mean To You.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Internet: The Nursing Resource. Is the INTERNET a government association? Yes No.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Protecting Your Assets By Preventing Identity Theft
PASSWORD SECURITY A Melbourne Athenaeum Library
InformatiOn Technology Services
LastPass Password Management
IT Security Awareness Day October 19, 2016
Fraud Protection.
Fraud protection.
Key words: Secure | Password | Character
Hotspot Shield Protect Your Online Identity
Introduction to Web Safety
How to set up an Electronic Payment to MCP
Financial Aid From the Student’s Perspective
Password strength Dr. X.
Safe and Secure: Choosing a Safe Screen Name
Protecting What’s Yours: Your Identity
Protecting Your Identity:
Password Management Limit login attempts Encrypt your passwords
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
PowerChart New User Tutorial
Introduction to From the Saint Paul Public Library.
An Introduction to Web Application Security
Passwords.
Start at our website at In the upper right hand corner is a link for “Office 365”
Protecting Your Password
HOW TO APPROVE A SINGLE CREDIT CARD TRANSACTION IN PAYMENTNET
InformatiOn Technology Services
Password AL-Salman Mohammed Mohammed Ali Rayan Rasheed.
Company Name | Phone Number | Website | Address
Keeping Our Data Secure
Privacy, Security, and Ethics
Presentation transcript:

Passwords Why all the bother?

Why passwords? They protect: Theft Examples: Money Information Identity Theft Examples: Credit Card Sprint Tax Returns Genealogy

Making Strong Passwords Length Minimum: 9 characters Strong: 12 characters Very Strong: 14 characters Mixture of: Lowercase letters (a-z) Uppercase letters (A-Z) Numbers (0-9) Symbols (~`!@#$%^&*()-_=+[]{}\|;:’”<>,.?/)

Making Strong Passwords

Password Don’ts Don’t use personal information Don’t use repeating characters Don’t use dictionary words, even with replacements “elephants” or “313ph4nt$” Don’t reuse passwords…

Password Reuse In general, it is a bad idea Exception: If one website gets hacked, then they have access to all other websites using that same password Exception: Username & password combo is unique Non-sensitive accounts Account Grouping

How to create good passwords? Phrase “We the People of the United States, in Order to form a more perfect Union” “WtpofUSiOtfampU” “Wtp0fU$-101f4mpU” “High on the mountain top, A banner is unfurled” “Hotmt-4biu”

How to create good passwords? Combine several unrelated words together (xkcd.com):

Password Storage Not good, but very common: Problems: Post-it note on monitor Password cheat sheet Under the keyboard Browser password saving Problems: Number of accounts keeps growing Needs to be available at home and elsewhere Needs to be secure

Password Storage

Password Storage Smartphone password managers Password protected file LastPass Dashlane Password protected file Contains website addresses, usernames, passwords, etc Evernote, MS OneNote, MS Word Password shorthand Instead of “correcthorsebatterystaple”  “chbs”