Password Awareness.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Lecture 6 User Authentication (cont)
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Key Management/ Infrastructures Security Basic problem Cryptographic security: must be some keys that are not cryptographically protected. Must.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
The Office of Information Technology Two-Factor Authentication.
Credit Card vs. Debit Card. Debit Cards Also called “check cards” –Works just like writing a check Deducts money from your checking account.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
The Impact of Physical Security on Network Security
Password Management PA Turnpike Commission
Hacking Phishing Passwords Sourendu Gupta (TIFR).
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
CSCE 201 Identification and Authentication Microsoft support Fall 2010.
Encryption Objective 1: Explain data encryption procedures.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
3D Password.
Understand User Authentication LESSON 2.1A Security Fundamentals.
PASSWORD SECURITY A Melbourne Athenaeum Library
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Key words: Secure | Password | Character
Microsoft Passport and Windows Hello Developer’s Guide to Windows 10 Build SDK Update Andy Wigley
PASSWORDS Unique is Good.
WELCOME.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Things To Avoid: 1-Never your password to anyone.
Passwords.
Authentication by Passwords
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Strong Password Authentication Protocols
Chapter 3: Protecting Your Data and Privacy
Zachary blum Sam Garcia Courtney Sullivan
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
BY: Michael Etse and Maverick Fermill
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Getting Started With LastPass Enterprise
Password Security.
Presentation transcript:

Password Awareness

Authentication Who Are You?

Authentication Something you know Password PIN # Secret Handshake (OG)

Authentication Something you have Phone Smart Card USB Drive

Authentication Something you are Face Scan Fingerprint Iris Scan

Access vs. Information Security Balancing Act Password Complexity Number of Factors Biometric Sensitivity

Out of Balance Password iPhone Password: 000000

Duel-Factor Out of Balance Who is this?

Duel-Factor Out of Balance ? ? ? ? ? ? ? ? ? ? ? Benedict Cumberbatch – Password?

Basic Password Guidelines Basic Rules?

Basic Password Guidelines Don’t Post/Text/Share Your Password Don’t Use Just One Password for All Accounts Don’t Use Personal Information Beware of Phishing Beware of Shoulder Surfing Don’t Save Passwords in a Browser

What Makes a Good Password? Hard for Computers to Guess

Hard for Computers to Guess Entropy

Hard for Computers to Guess Entropy Degree of Disorder Randomness

Hard for Computers to Guess Entropy Factors Password Length Character Set

What Makes a Good Password? Easy for Humans to Remember

Easy for Humans to Remember Passphrase

Easy for Humans to Remember Don’t Get Me Involved with Some Crazy Process

Password Check http://www.passwordmeter.com/

Easy for Humans to Remember Passphrase to Password DGMIwSCP

Password Check http://www.passwordmeter.com/

Adding Entropy DGMIwSCP D&m1W$c9

Password Check http://www.passwordmeter.com/

Password Contest

Password Managers LastPass 1Password @Keeper

LastPass Demo

Contest Results

Information Assurance Program at UNM http://ia.unm.edu