©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

L kout Initiative Choosing a Strong Password Office of Information Technology.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Subtitle Version or Date Presentation TitleIntroduction to using BCeSIS Module 2.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
Internet Security Passwords.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
How To Protect Your Privacy and Avoid Identity Theft Online.
Secure Computing Series Computer Password Safety.
Today’s Objective: I will create a strong, private password.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
How To Protect Your Privacy and Avoid Identity Theft Online.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
©Holm Publications Security Awareness Presentation.
Security Planning and Administrative Delegation Lesson 6.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
SCC Student Technology Access Student Login Guide SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login User name – this.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
“L  kout” Initiative Choosing a Strong Password.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
INTERNET SAFETY FOR KIDS
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Security A major concern related to the design of web applications Many sites contain a huge quantity of personal and financial information. Web sites.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Username Usage and Password Security. Username Usage.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Key words: Secure | Password | Character
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Password strength Dr. X.
Protecting What’s Yours: Your Identity
Information Systems Desktop Support
Choosing a Strong Password
Introduction to From the Saint Paul Public Library.
Passwords.
Introduction to Computers
Choosing a Strong Password
Lesson 2: Epic Security Considerations
Chapter 3: Protecting Your Data and Privacy
Lesson 2: Epic Security Considerations
Protecting Your Password
Choosing a Strong Password
Keeping Our Data Secure
Presentation transcript:

©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic

©2002 TechRepublic, Inc. All rights reserved. Why passwords are important They are the entry point to IT and other enterprise resources. They provide access to the VPN, servers, and the network. Misused or stolen passwords can give intruders access to your personal info.

©2002 TechRepublic, Inc. All rights reserved. Internal password theft is easy “Social engineering” is one of the easiest ways for intruders to compromise networks and other organizational systems. Others can hear you give a password to someone you trust. Someone looking over your shoulder can discover a password. Don’t keep a copy of your password in a desk drawer, on a monitor, or under a keyboard.

©2002 TechRepublic, Inc. All rights reserved. Protect your password Your password is yours alone. Don’t share it with anyone, including supervisors, personal assistants, or IT personnel. Never write down your password. You wouldn’t write your PIN number for your ATM card, would you? Do NOT: Say your password aloud. your password to a co-worker. Offer anyone hints about what your password might be.

©2002 TechRepublic, Inc. All rights reserved. Create a strong password Weak passwords are common because: They are easy for users to remember. They include personal information about the user. They consist of known words that can be found in many hacker password dictionaries. They contain number or letter sequences or letter-to-number substitutions, such as E for 3 or O for zero.

©2002 TechRepublic, Inc. All rights reserved. Create a strong password Strong passwords: Are six characters or longer. Can’t contain any part of a user’s full name or username. Don’t use any term that could easily be guessed by someone who is familiar with you. Should not include any personal information, e.g., the name of a spouse or a street address.

©2002 TechRepublic, Inc. All rights reserved. Create a strong password Strong passwords, cont.: Should not contain personal identification numbers, including those on a license plate, your telephone number, birth date, or any part of your Social Security number. Contain characters from three of the four classes of characters.

©2002 TechRepublic, Inc. All rights reserved. The four character classes are: English uppercase letters (A, B, C). English lowercase letters (a, b, c). Arabic numerals (1, 2, 3). Special characters ( !, *, $, or other punctuation symbols).

©2002 TechRepublic, Inc. All rights reserved. Examples of bad passwords Sports teams or terms: LouvlleSlgr Number sequence: *12345* Letter string: AAAAAA Mixed-case sequence: ABcdEFgh Company name: AcmeIT Keyboard sequence: QwERty or ASdFgh

©2002 TechRepublic, Inc. All rights reserved. Variations on a theme are still weak Original password: BobJones TechRepublic Tiger Login Password Modified password: BJones25 1TechRepublic1 Regit Log-in Always avoid this word or anything similar to it

©2002 TechRepublic, Inc. All rights reserved. Better passwords Original password: LouvlleSlgr AcmeIT QwERty BJones25 1TechRepublic1 New password: L*6v11E5Lgr aC&3i7 Y7#RQ^e 890NEs2% T3CH&R3pU8Lic

©2002 TechRepublic, Inc. All rights reserved. Conclusion A password is the key to your organization’s resources. A strong password can protect your personal account. Take strides to make strong passwords that are not obvious to someone familiar with you. Remember to change your password on a regular basis.