Passwords They can be easy but very difficult to crack.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Establishing and Using an IU Guest Account By Cynthia D. Hollingsworth, M.S. Coordinator of Instructional Design Adjunct Assistant Professor Indiana University.
Passwords are the key to network and data security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Presented by the Instructional Technology Center Please log into your workstation while you await the beginning of class. Use your own username and password.
Library Class. Online Encyclopedia Current: updated every year Quick and easy Books in our reference section 2009 is our newest Do not need a computer.
The Simplest Security A Guide to better Password Practices Provided By: Utah Education Network – DSO.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
DICTIONARY AND THESAURUS antonym synonymUse a thesaurus to look up synonyms and antonyms Ex. The opposite (antonym) of day is night Ex. A similar (synonym)
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Password Management PA Turnpike Commission
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Chapter X When can I consider my personal data secure?
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Created by: Yildan Husnu.  1. What is the most commonly used letter in the English alphabet? Clue: it is one of the vowels.

25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Component 9 – Networking and Health Information Exchange Unit 9-2 Privacy, Confidentiality, and Security Issues and Standards This material was developed.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Username Usage and Password Security. Username Usage.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
System Access Authentication
National Cyber Security Month
Synchronizing Text & Objects
Presentation title goes here
English Language Quiz.
Presentation title goes here
A1 Student Posters Posters Print Services  Robinson Library  University of Newcastle  phone: Introduction The.
<ELLIIT Project Name>
Week 2 Keyboard Orientation.
Poster Title Heading Heading Heading Heading Heading Heading
2016 REPORTING The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog. The quick brown fox jumps over the lazy dog.
Definición y tipos discriminación
A0 PowerPoint Poster Posters at Print Services Robinson Library, Newcastle University • • phone Introduction.
English Language Quiz.
Protecting Your Password
2016 REPORT.
buy The quick brown fox jumps over the lazy dog. Font
When can I consider my personal data secure?
A1 Student Posters Posters at Print Services  Robinson Library  University of Newcastle  phone: Introduction.
T A R S E L I T L I S S T O TEMPLATE – SUBTITLE
201X REPORT.
目 录 The quick brown fox. 目 录 The quick brown fox.
Keeping Our Data Secure
KEYBOARDING: SPEED & ACCURACY
2016 REPORT.
Presentation transcript:

Passwords They can be easy but very difficult to crack.

Why Passwords Identification, Authentication Last level of security for incoming data It is needed to get on some one else computer Some one can masquerade as you on your account or computer An insecure password can wreak havoc in your life Through your account some one can compromise the local network

The Do Not of Passwords Do not use Proper Nouns Do not use Dictionary Words Do not use Foreign Words Do not use sequences Do not use words with vowels removed Do not put the password on a sticky note next to the keyboard or monitor Do not put username and password on same piece of paper Do not use personal information for password Do not use words written backwards Do not use words with numbers added to the end

The Do of Passwords Do use a password with 8 or more characters Do use Upper Case letters Do use Lower Case letters Do use numbers Do use special characters such $, & Do use mnemonic phrase Do use memorable phrase Do use substitution Do use a wallet or purse to keep hint to password handy Do use shocking phrases Do use two or more words that have substitution to make one word Do change the password often, like three times a year

Characters Alphabet, numbers #, $, %, ^, &, *, ?,, = a, A, at 3 = e, E 1 = l, L, I, I

Phrases Mnemonic –ImuKat = I’m a cat Memorable –Qbfjold* = Quick brown fox jumped over lazy dog Shocking –Uses emotion to remember –Contains grossly obscene, racist, extreme juxtaposition of ideas (running mollusks)

More Password Hints Transformation techniques –Interweaving of two words Iron horse = IhrOrnSe –Substitution of synonyms Coffee break = jaVa*rest –Substitution of antonyms Stoplight = starTdark

References Sarah Granger, “The simplest Security: A Guide to Better Password Practices”, Grady Ward, “Passphrase FAQ”, kl.de/~conrad/krypto/passphras-faq.html kl.de/~conrad/krypto/passphras-faq.html University of Michigan, “Password Security: A Guide for Students, Faculty, and Staff of the University of Michigan”,