Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.

Slides:



Advertisements
Similar presentations
Directorate of Learning Resources Accessing electronic journals from off-campus This causes lots of headaches, but dont despair, heres how to do it! If.
Advertisements

E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
Web Shift Booking System
TopicsBackNext MathXL for New Users East Los Angeles College Mathematics Lab.
Make-N-Take A Wiki Jenifer Marquis and Shawna Andrews.
EDW647 Internet For Educators Setting Up a Gmail Account Roger W. Webster, Ph.D. Department of Computer Science Millersville University (717)
Center Accreditation Online System
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
August 15 click! 1 Basics Kitsap Regional Library.
Chapter Accreditation Online System Usage Tutorial Department of Member Relations & Grants National Children’s Alliance.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Google Chrome Your Customized Google Buddy April 2012 John Riley and Denise Tate-Kuhler.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Parent Portal Also known as: The next best thing to being at school with your student!
Protecting Your Personal Information November 15, 2013.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Uploading Digital Presentations to YouTube MARSHLATIN.WORDPRESS.COM.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
How & Why 1 of 8 security. 2 of 8 security – Why? 1.Your address is your online identity If it is not secure you may get s (including.
Adxstudio Portals Training
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Our Destiny Has Arrived (at least at the library).
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
The first thing you need to do is log in. This is what the “Log In Screen” looks like. Remember to get teacher permission and login information prior.
Prepare to set up you new Gmail Account. What are you using? Software Program Name Owned bySoftware Location Outlook ExpressMicrosoftOn Your Computer.
How to set up an account- Non-Technical Aimee Lilley.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
How to create an educational wiki. Laurie Roberts 2010.
Policies and Security for Internet Access
Gmail Password Recovery Process Find Gmail technical support for Gmail password recovery, recover Gmail password, reset Gmail password, change Gmail password,
Yahoo Help Phone Number Get Instant Help.
Single Sign-on with stoneware Presented by:. Access Stoneware Visit the district home page. In the main menu, hover over LCS Employees and choose Stoneware.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Gmail Password Reset Process Do you want to Reset your Gmail account password because your Gmail account password is not secure or easy to guess or your.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
How to Backup your Encrypted Files A comprehensive guide on how to encrypt your most private files and upload them to a back-up server.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Choosing A Username and Password
What this activity will show you
Gmail is one of the finest service which is free, advertising-supported service developed by google. User can easily access gmail on the web.
Creating and Using Your FSA ID: An Overview
Creating and Using Your FSA ID: An Overview
Gmail Password Recovery Process
Yahoo Support Ireland Toll-Free Number:
How to Use Members Area of The Ninety-Nines Website
ONLINE BANKING ON YOUR PHONE
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
yahoo mail technical support number
How Can I Create A Gmail Account
Multifactor Authentication & First Time Login
NOTE TO PRESENTER This presentation provides information on the FSA ID that can be used in outreach to students and parents. The presentation was created.
Welcome to FOCUS FOCUS website:
A few tricks to take you beyond the basics
start to finish – November 20181
Learning How to Create an Online Interactive Poster using
Student user guide for getting started with Microsoft
Presentation transcript:

Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1

Objectives Understand what is two-factor authentication Define how to enable two-factor authentication for Understand how to setup step by step Understand most common worst password Know how to securing your password Understand what is password management Pang Chamreth, IT Development Innovations 2

What is Two-Factor Authentications Two-factor authentication adds a second level of authentication to an account log-in. Two-factor authentication is used to increase security by requiring: “Something you know” AND “Something you have” Pang Chamreth, IT Development Innovations 3

How to enable two factor authentications for: LinkedIn Twitter Microsoft Apple Google Yahoo Dropbox Pang Chamreth, IT Development Innovations 4

Benefits of Two-Factor Authentications Stronger security When logging in to your account, after typing in your username and password, a second password sent to you via text. If a hacker gets your username and password they still won’t be able to get in to your account. Pang Chamreth, IT Development Innovations 5

Does loss of control over your ? Pang Chamreth, IT Development Innovations 6

How two-factor authentication can help Can recovery your ’s password Can protect your account from hacker Easy to used with 1 st password & 2 nd mobile See the practice to use 2-step verification on your google account Pang Chamreth, IT Development Innovations 7

Practices to used two- factor authentication Practices to used two- factor authentication with google account. Set up 2- Step Verifications Pang Chamreth, IT Development Innovations 8

2-step verification Help to prevent hacker that try to use your account when they know your username and password. For best practices we will set up 2-Step Verification in Gmail account. Pang Chamreth, IT Development Innovations 9

Why you should use 2-Step Verification 2-Step Verification adds an extra layer of security to your Google Account, drastically reducing the chances of having the personal information in your account stolen. To break into an account with 2-Step Verification, hacker would not only have to know your username and password, they'd also have to get a hold of your phone. Pang Chamreth, IT Development Innovations 10

How it work Enter your password Enter a code from your phone Keep it simple Pang Chamreth, IT Development Innovations 11

Set up 2-Step Verification Sign in to your Google Account settings page by clicking on your name or picture in the upper right corner of the screen and then clicking Account. Pang Chamreth, IT Development Innovations 12

See Setup process At the top, click Security tab In the Password box, click Setup next to “2-Step verification” This will bring your to the 2-Step Verification settings page. You will then see a step-by-step guide which will help you through the setup process. Pang Chamreth, IT Development Innovations 13

Set up a backup Once you’re done, you’ll be taken to the 2-Step Verification settings page again. Be sure to review your settings and Set up a backup phone numbers and Get backup codes. You’re done! Next time you sign in, you’ll receive an SMS with a verification code Pang Chamreth, IT Development Innovations 14

Common Techniques for Protecting s The three common techniques adopted by most internet users for protecting themselves are: 1.Logging out of accounts when they’re done, and not just close your 2.Confirm it is a secure session or website (such as for “security” 3.Changing password periodically Pang Chamreth, IT Development Innovations 15

Best practices of password management Why best practices of password management are required? Recently, most of people have their own password at least three so they are difficult to remember all of it because of they don’t know how to manage their password properly. You will see the common password that the hacker can easily to guess. Pang Chamreth, IT Development Innovations 16

Most Common Passwords Most people choose passwords that can too easily be guessed. If your password can easily be guessed, or it can easily be reset, you are at risk of identity theft. Pang Chamreth, IT Development Innovations 17

Most Common Passwords Pang Chamreth, IT Development Innovations 18

Password recommendations A good password are: –Private –Secret –Easily Remembered –At least 8 characters, complex –Not guessable –Changed regularly Beware that someone may see you typing it. If you accidentally type your password instead of your login name, it may appear in system log files Use 3 rd party tools to encrypt password Pang Chamreth, IT Development Innovations 19

Sample how to put password Combine 2 unrelated wordsMail + phone = Abbreviate a phrase My favorite color is blue= Mfciblue Music lyric Happy birthday to you, happy birthday to you, happy birthday dear John, happy birthday to you. hb2uhb2uhbdJhb2u Pang Chamreth, IT Development Innovations 20

How are passwords stolen? Cracked Brutef orce Dictionary- based Decryption Theft Key loggers Screen captures Social engineering Pang Chamreth, IT Development Innovations 21

Securing your password Do not share your password with others Avoid recording your passwords in an insecure manner Avoid saving passwords in Web browsers and other applications Always delete s that contain a password Use a Web site’s logout feature rather than just closing your browser Be smart with secret questions and answers Create strong passwords with a combination of number, special symbols, and letters that cannot be guessed Always change passwords Once every three months is recommended Pang Chamreth, IT Development Innovations 22

Password management Today you need to remember many passwords. You need a password for: -Windows network logon, -Servers and Routers - account, Social account -your website's FTP password, -online passwords (like website member account), etc. Password Management(LastPass – KeePass) Pang Chamreth, IT Development Innovations 23

What is KeePass? Free open source for password manager No need remember many passwords Can bring along with you any where Pang Chamreth, IT Development Innovations 24

Q & A ***Security is everyone’s responsibility! 25Pang Chamreth, IT Development Innovations