Information Security and Cybercrimes

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Objectives Overview Define an operating system
ROWAN COUNTY PUBLIC LIBRARY Using iTunes. Objectives Today you will learn how to: Navigate the iTunes interface Add music to the iTunes library Navigate.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
How to use accent marks on a PC Ever wonder how to use accent marks or other common Spanish language characters on your PC? There are several ways. This.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
TEMPLATE DESIGN © Bluetooth Login Key RIT Computer Engineering Senior Design Project Tim Wesley, Dan Chen Spring 2009.
Tom Parker Project Manager Identity Management Team IT Security Group.
Microsoft Office Illustrated Using Advanced Features.
With Microsoft Access 2010 © 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
1 RVCC Phone MIS Help Desk, Ext 4357 (HELP) Holly Smythe, Instructional Designer, Ext 8451 Lonny Buinis, Instructional Designer, Ext 8306.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Today’s Objective: I will create a strong, private password.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
TxConnect – A Parent’s View. 4/9/  Is a web-based application designed to allow parents access to student information entered in the txGradebook.
Chapter 7 Installing and Using Windows XP Professional.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
Password Management PA Turnpike Commission
Software GCSE ICT.
Chapter 4 System Software.
ESCCO Data Security Training David Dixon September 2014.
Advanced Lesson 4: Advanced Collaboration To prevent users from inserting, deleting, and renaming worksheets, protect the workbook. When you protect a.
Practical PC, 7th Edition Chapter 2: Working with Windows
CIS 450 – Network Security Chapter 8 – Password Security.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Explain the purpose of an operating system
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Password Cracking By Allison Ramondetta & Christine Giordano.
Protecting Your Password
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Remote Access: Guide for MAC. Transforming Healthcare NFL & SATL IT&S Slide 2 To Begin, Click on Safari.
Ms Burnham Wild Card Excel and Graphing General Knowledge.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
A Guide to Using SMART eR Online Ordering (Electronic Requisitions) Managing Employee Timeoff, Electronic W-2s, Etc… 1.
Internet: The Nursing Resource. Is the INTERNET a government association? Yes No.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Precision Spine Inc. Mobile Device Setup. Android Devices.
MICROSFTACCESS tables. DATA TYPES Field TypeWhat It Holds Short Text Text up to 255 characters long (including spaces and punctuation). Use a Text field,
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
DATA SECURITY FOR MEDICAL RESEARCH
Computer Literacy BASICS
for the Final Stage of our Merger:
Chapter 1 Getting Started
Passwords.
HP Support tells you how to password protect your PC.
Protecting Your Password
Module 3 Using Linux.
Getting Started With LastPass Enterprise
Presentation transcript:

Information Security and Cybercrimes By Clemente Andre Inocente M.A. & B.S.A (SDSU Alumni) College of Sciences at SDSU Operating Systems Analyst & Information Technology Consultant

What Is The Moral of This Scene?

Supplement Topics To Our Textbook John the Ripper (Mac, Unix, PC) Suggested passwords to use, but really up to the individual Secured Your Mobile Devices? (e.g. iPads, cell phones, laptops, etc…) Got Anti-Virus/Spyware? Automating System Security and monitoring (e.g. scheduled preventive maintenance)

John the Ripper (Mac, Unix, and Windows) John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords, although Windows LM hashes and a number of other password hash types are supported as well. John the Ripper is free and Open Source software, distributed primarily in source code form. http://www.openwall.com/john/

Suggested Passwords, But Up To Individual Strong passwords and passphrases contain characters from each of the following four categories: Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? / REF: Microsoft Windows Help- Tips for creating strong passwords and passphrases

Suggested Passwords, But Up To Individual (Cont…) Don’t use names, words found in a dictionary, phone numbers, dates, or simple combinations of these. Avoid using a pattern of keyboard characters, such as diagonal lines of keyboard keys (for example, njimko). Use a sequence of random characters. Include a mix of upper- and lowercase letters, numbers, punctuation marks, and (if the site or item allows it) characters typed while holding down the Option key. While defining a password, use the Password Assistant to see how secure your password is. To open the Password Assistant, click the Key button next to the Password field or the New Password field. Start with a phrase, verse, or line from a song. Omit some letters, and transform others into numbers or punctuation marks that resemble the original character. You might want to insert additional punctuation and numbers too. (Cont….) REF: OS X Mountain Lion-Tips for creating secure passwords

Secure Your Mobile Devices? (e.g. iPads, cell phones, laptops, etc…) Password protected/swiping/Face-to-Unlock. Delete: unused apps., saved passwords & user names System updates/PRL (mobile phones) http://www.verizonwireless.com/care/popups/prl.html

Got Antivirus, SDSU Students do REF: http://www-rohan.sdsu.edu/~download/mcafee.html

Systemizing Security Through Automation and Monitoring (e. g Systemizing Security Through Automation and Monitoring (e.g. scheduled preventive maintenance) OS & Software Automatic Updates (scheduled) Manually check updates, just like your car. Got Plug-ins/ Add ons? Check out my site: sci.sdsu.edu/andre-inocente/mmtest.htm

Security Through Automation and Monitoring (e. g Security Through Automation and Monitoring (e.g. scheduled preventive maintenance) (Cont…)