Passwords are the key to network and data security.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Is This You? Internet Safety Day
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
PowerChart Basics Session 1 June Goal: To acquaint the user with the basics of PowerChart patient information security. Objective: 1.State the importance.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
Passwords They can be easy but very difficult to crack.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
How to Get an Address. What is ? is a way to send and receive electronic mail. You do this by setting up an account with one of.
Kai C-W 7R. If you are planning to be safe on the internet, here are some suggestions of how you could: Put all of your account settings on private. Only.
Tips for Success!. Laundry Mom’s not here to do it, and it’s not free! Some Basic Laundry Tips: Wash all colors in cold water Anything 100% cotton will.
Online banking Using the internet for your banking.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Security Awareness Norfolk State University Policies.
Password Management PA Turnpike Commission
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
Database Security DB0520 Authentication and password security Authentication options – strong, weak Review security environment - Sys Admin privileges.
1 Safely Using Shared Computers Amanda Grady December 2013.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Netprog: Kerberos1 KERBEROS. Contents: Introduction History Components Authentication Process Strengths Weaknesses and Solutions Applications References.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
Safeguarding your Identity While Online i-Safe, Inc.
“L  kout” Initiative Choosing a Strong Password.
What You Need to Know About Your Personal Information.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
Good strong passwords are key to keeping your access and data safe.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Let’s Put an end to sentences! Language Arts What is an end mark? An end mark is also known as punctuation, and comes at the end of a sentence. It lets.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Username Usage and Password Security. Username Usage.
INSIDER TIPS TO GET YOU THROUGH A MI BRIDGES APPLICATION HALEY MANUEL WILL CHEATAM WASHTENAW HEALTH PLAN.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Why is this called “the ostrich effect”?
Fraud Protection.
Fraud protection.
Key words: Secure | Password | Character
Security and Privacy in Social Networks
Dove science academy Cyber Club
Information Systems Desktop Support
Things To Avoid: 1-Never your password to anyone.
Topic 3: Data Encryption.
DOVE SCIENCE ACADEMY CYBER CLUB
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
استاندارد مدیریت امنیت اطلاعات ISO 2700X
Lesson 2: Epic Security Considerations
Protecting Your Password
what I know now about passwords…
Login to our New ITS Page
Keeping Our Data Secure
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Passwords are the key to network and data security. Here are a few helpful tips for selecting, safeguarding and successfully using your password.

Passwords are like underwear . . . the longer the better! Use a password that is at least 7 characters long. Use a mix of punctuation marks, letters and numbers. Choose letters from a phrase that is meaningful to you.

Passwords are like underwear . . . change yours often! CHANGE your password if: you’ve written your password down and you think it has been exposed. you’ve told your password to anyone. you've used an insecure service such as FTP or telnet.

Passwords are like underwear . . . don't leave yours lying around! KEEP your password secret! Never leave your password in a non-secure place. Never let anyone look over your shoulder while you type your password. Never use the same password on other systems or accounts.

Passwords are like underwear . . . don't share yours with friends! PROTECT your password! Don’t share your password with a support person or colleague. Don’t share your password with a family member. Don’t share your password with a roommate.

Passwords are like underwear . . . be mysterious! CREATE a unique password! Never use a dictionary word, even spelled backwards. Never use a foreign word. Never choose a password that relates to you personally, such as your name, ID, birth date.

Some examples of BAD passwords: MaryJane (Not complex at all. Contains personal information.) apple234 (Not complex. Contains a dictionary word.) Chipola2 (Contains personal information.) PuppyDog (Contains dictionary words.)

Some examples of GOOD passwords: wLc2$pLd Gbg2Co*d (“washing laundry costs two dollars per load") Gbg2Co*d (“good boys go to church on Sundays") bAn4NaD0c ("banana + doc") PuqP4d0g (Interchange letters for numbers or similar letters to remove the dictionary words from “puppy dog”.)

An insecure password can put you, your co-workers, the college and our students at risk. Be aware and be secure.

The End Presented By: Information Systems Management