Strong : Do You Really Need Them? October 30, 2013.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Authentication and Constructing Strong Passwords.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Computer Viruses.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
How to Login into SSA ?. Home Page Click on My Profile.
INTERNET SAFETY FOR STUDENTS
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
KEEPING YOUR FAMILY SAFE ONLINE Tips from a Parent Who is Paid to be Paranoid Aaron Ades AVP Cybersecurity at MetLife and Parent of Two Children of the.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Information Security Phishing Update CTC
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Information Security 101 Five things you should learn to protect your data and privacy February 26/27, 2014.
Safe Use of Social Media Cadets – Air Force’s Future.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
CCT355H5 F Presentation: Phishing November Jennifer Li.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Protecting Your Assets By Preventing Identity Theft
PASSWORD SECURITY A Melbourne Athenaeum Library
IT Security Awareness Day October 19, 2016
An Introduction to Phishing and Viruses
Ways to protect yourself against hackers
Cyber Security Awareness Workshop
Education – Partnership – Solutions
Cybersecurity Awareness
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
Protecting Your Identity:
To , or not to – that is the question
Introduction to Computers
If I’d only known then what I know now about phishing…
what I know now about passwords…
Creating Passphrases Include Examples NOT REQUIRED
What is Phishing? Pronounced “Fishing”
Company Name | Phone Number | Website | Address
Keeping your passwords safe
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Strong : Do You Really Need Them? October 30, 2013

History of computer passwords – who dunnit first? Do you really need them? A user’s perspective A hacker’s perspective – the world of hackers, password crackers. It’s just ‘business’, ‘ hacktivism’ or ‘for fun’ Who’s winning? – Users or the hackers? Strong passwords are long passwords (phrases) Use two-factor authentication when available – example Google offers it as an option Make it ‘not worth the effort’ for the hacker When things go wrong Presentation Overview

Fernando Corbató at MIT in the 1960s. Was MIT's CTSS computer the first one to use passwords? Photo Courtesy : MIT Museum Who dunnit first?

Strong passwords – do you really need them ? You need passwords – That serve the purpose to keep your information safe – Keeps you at the end of the hackers’ list – Help keep your data secure – Help keep you safe – Phrases – Randomness – Nonsensical – Use words from a language other than English – Use unique passwords for different sites

What data should you be worried about protecting? Examples: Medical – diagnosis, prescriptions, insurance Financial – credit report, credit card, bank account information, payroll Personal – wills, inheritance, family heirloom data (historical letters) Informational – location, vacation itineraries Identity – SSN, Name Intellectual – innovations, research, creativity

You are the target ScamMitigate the Risk Brute forcing the passwordStrong password – keeps you at the end of the hack-able list Guessing attackStrong password – you are not the low hanging fruit Social engineeringThe ‘attacker’ can’t read your mind PhishingDo not give out your username and password to Anyone, no matter what the circumstances be Coding practicesOWASP, training Patch and updatePatches and updates fix bugs and remediate known vulnerabilities EncryptionUse password vaults – such as KeePass

Too many passwords Strong passwords are hard to remember I should not need to change my passwords Inconvenience Is there an easier way to handle this? It ( compromise) won’t happen to me A user’s perspective

Simple passwords are easy to crack Motivation - Am I doing this for money, ideology or just fun? Is this victim a one-time opportunity, persistent ‘home’ or resale-able goods? A hacker’s perspective

Mitigate risk with minimum inconvenience to the user What is at stake? – personal safety, reputation, revenue, fines Technology helps, but nothing beats user awareness A security professional’s perspective

How can you protect your data? People Process Technology

Be aware that data.. –Is interconnected –Identifies you –Impacts you and others –A strong password and being vigilant is your strongest line of defense

Who is winning?

Strong Passwords are Long Passwords Use passphrases and not simple, predictable passwords Use nonsensical combination of words, numbers and special characters NEVER share your username and password with anyone Learn to recognize phishing –Who sent it –What is being asked, –Hover the Links to verify legitimacy before clicking – Report to Use a password vault like KeePass, SplashID etc. – ( Mac OSX : Windows : ) Change your passwords – reasonable duration for the type of data that password protects Personal Safety First, Information Security a close second Use two-factor, two-step authentication when available Make it ‘not worth the effort for the hacker’ When things go wrong, report it to the IT Support Center or

Presented by: Noor Aarohi Senior Analyst - Risk and Compliance GWIT Information Security and Compliance Services