Passwords by The UTHSC Information Security Team.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Using LastPass CONFIDENTIAL.  Great password management is impossible w/o a great tool  Auto-fill (hands-free login) will save you approximately 1 hour.
Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
By the UTHSC Information Security Team. What is Online Social Media – Social Network? Social media can be best described as websites and applications.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Threats to I.T Internet security By Cameron Mundy.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Microsoft Windows LEARNING HOW USE AN OPERATING SYSTEM 1.
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Staying Safe Online Keep your Information Secure.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Becoming More Secure Online: Passwords & Social networking Walid Al-Saqaf For the Workshop: Secure Information Gathering, Storing, and Sharing Istanbul,
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology January 17,
Protecting Your Personal Information November 15, 2013.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
INTERNET SAFETY FOR KIDS
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
How & Why 1 of 8 security. 2 of 8 security – Why? 1.Your address is your online identity If it is not secure you may get s (including.
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
David Wigley HCC Security Architect Security Trends for 2016.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Technological Awareness for Teens and Young Adults.
Google Apps for Education Account Overview for Staff.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Internet Safety.
2.4 Cyber-Safety.
PASSWORD SECURITY A Melbourne Athenaeum Library
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
IT Security Awareness Day October 19, 2016
Class Name: Online Safety & Privacy Basics
Internet Identity, Safety, & Security
Information Security.
Ways to protect yourself against hackers
Passwords.
Cybersecurity Awareness
Setting up an online account
2.4 Cyber-Safety.
Introduction to Computers
Internet Safety – Social Media
Keeping your passwords safe
Presentation transcript:

Passwords by The UTHSC Information Security Team

Before we begin… Google Yourself!

Think Like a Hacker Ask Yourself… What information would a hacker need to get into any of your financial, professional, and/or personal online accounts? Ask Yourself… What information would a hacker need to get into any of your financial, professional, and/or personal online accounts?

Banking and Business services Banking and Business services How many passwords do you have? Personal s Social media and news Work related accounts

Password 101  A secret word or phrase that must be used to gain admission to something.  A string of characters that allows access to a computer, interface, or system.  A secret word or phrase that must be used to gain admission to something.  A string of characters that allows access to a computer, interface, or system.

Why do I need a secure password?  Passwords are the key to your digital life.  Passwords secure vital information such as:  Date of Birth  Address  Mother’s Maiden Name  Bank details  Social Security Number(s)  Other financial information  Your Entire Identity  Passwords are the key to your digital life.  Passwords secure vital information such as:  Date of Birth  Address  Mother’s Maiden Name  Bank details  Social Security Number(s)  Other financial information  Your Entire Identity

How to create a secure password Use a mixture of the following  CAPITAL and lower cAsE  M1xture 0f l3tt3r5 numb3r$ & $ymb0|$  Do not use your children's names, pets’ names, dates of birth, your address, grandkids names, parents names, etc. Refrain from using any names, including names of past schools/institutions you attended, organizations you have worked for, and names of town/cities/states. Use a mixture of the following  CAPITAL and lower cAsE  M1xture 0f l3tt3r5 numb3r$ & $ymb0|$  Do not use your children's names, pets’ names, dates of birth, your address, grandkids names, parents names, etc. Refrain from using any names, including names of past schools/institutions you attended, organizations you have worked for, and names of town/cities/states.

What is a passphrase?  A passphrase is a sequence of words or other text used to control access to a computer system, program or data.  A passphrase is similar to a password in usage, but is generally longer for added security.  Basically, passphrases are combination of random words or sentences.  A passphrase is a sequence of words or other text used to control access to a computer system, program or data.  A passphrase is similar to a password in usage, but is generally longer for added security.  Basically, passphrases are combination of random words or sentences.

How to Create a Passphrase Method #1  Create a sentence that you can remember.  My favorite drink is lemonade 1987! Method #2  I want a peanut butter and jelly sandwich every Tuesday for the month.  IwaPB&Jet4tm Method #1  Create a sentence that you can remember.  My favorite drink is lemonade 1987! Method #2  I want a peanut butter and jelly sandwich every Tuesday for the month.  IwaPB&Jet4tm

Use the site name to increase your security of passphrase  Youtube – Myfavoritydrinkislemonade1987!Yt  Twitter – Myfavoritydrinkislemonade1987!Tr  Facebook – Myfavoritedrinkislemonade1987!Fb  Youtube – Myfavoritydrinkislemonade1987!Yt  Twitter – Myfavoritydrinkislemonade1987!Tr  Facebook – Myfavoritedrinkislemonade1987!Fb

Password Hierarchy 1. Banking (These passwords should be their own and not used on sites with lower security) 2. Work and/or Employment Organization (This password should be exclusive to your work logins. Do not use this password elsewhere.) 3. Business (Amazon, iTunes, Netflix, Hulu, Etsy, Apple Pay, Groupon) 4. (Used to reset and control all other usernames and passwords. This password should not be used anywhere else.) 5. Social & Entertainment (Facebook, Twitter, Youtube, Internet forums) 1. Banking (These passwords should be their own and not used on sites with lower security) 2. Work and/or Employment Organization (This password should be exclusive to your work logins. Do not use this password elsewhere.) 3. Business (Amazon, iTunes, Netflix, Hulu, Etsy, Apple Pay, Groupon) 4. (Used to reset and control all other usernames and passwords. This password should not be used anywhere else.) 5. Social & Entertainment (Facebook, Twitter, Youtube, Internet forums)

Secure Password Tips  Dictionary passwords are easy to crack. Do not use them.  Do not write your password down and stick it to your computer, monitor, under your keyboard.  Use a Mnemonic or a sequential pattern to remember your passwords  Dictionary passwords are easy to crack. Do not use them.  Do not write your password down and stick it to your computer, monitor, under your keyboard.  Use a Mnemonic or a sequential pattern to remember your passwords

So many passwords, so little time…What’s the solution?  Password managers  Are great to keep track of passwords  Should be encrypted  Uses a master password to keep your other passwords  Should have a cloud backup  Better than writing them in a “password book” (Never a good option)  Password managers  Are great to keep track of passwords  Should be encrypted  Uses a master password to keep your other passwords  Should have a cloud backup  Better than writing them in a “password book” (Never a good option)

Managing Passwords/Passphrases  A password manager is a software application that helps a user store and organize passwords.  Password managers usually store passwords encrypted, requiring the user to create a master password;  a single, ideally very strong password which grants the user access to their entire password database.

Advantages  Password management tools are really good solutions for reducing the likelihood that passwords will be compromised  No more easily lost scraps of paper!  Online or Cloud-based  Access your data from any computer, 24/7  No downloading software  Many password managers to try and choose what best fits your needs  Password management tools are really good solutions for reducing the likelihood that passwords will be compromised  No more easily lost scraps of paper!  Online or Cloud-based  Access your data from any computer, 24/7  No downloading software  Many password managers to try and choose what best fits your needs

Disadvantages  Because any computer or system is vulnerable to attack, relying on a password management tool creates a single point of potential failure.  If you forget the master password, all your other passwords in the database are lost forever, and there is no way of recovering them. Don’t forget the master password!  Because any computer or system is vulnerable to attack, relying on a password management tool creates a single point of potential failure.  If you forget the master password, all your other passwords in the database are lost forever, and there is no way of recovering them. Don’t forget the master password!

Most Common “Password Manager”

Choosing Password Managers  Users must be extra careful in choosing a provider.  Make sure they're a valid and reputable vendor.  TRIAL!!! Try recommended managers.  Users must be extra careful in choosing a provider.  Make sure they're a valid and reputable vendor.  TRIAL!!! Try recommended managers.

Recommended Password Managers  Dashlane (f) – keeps your passwords for you. Will go out and change your passwords on your request. It will autofill passwords on sites for you.  Keeper (p) – keeps your passwords and digital files for you. Encrypted and offers a cloud backup.  PasswordBox (f) - keeps your passwords. Offers a digital heir feature if something were to happen to you your information would be obtainable by someone else.  Last Pass (f/p) – allows you to save, organize, and access your login data. Your key never leaves your device, and is never shared with LastPass. Your data stays accessible only to you.  Dashlane (f) – keeps your passwords for you. Will go out and change your passwords on your request. It will autofill passwords on sites for you.  Keeper (p) – keeps your passwords and digital files for you. Encrypted and offers a cloud backup.  PasswordBox (f) - keeps your passwords. Offers a digital heir feature if something were to happen to you your information would be obtainable by someone else.  Last Pass (f/p) – allows you to save, organize, and access your login data. Your key never leaves your device, and is never shared with LastPass. Your data stays accessible only to you.

Password Generator  A random password generator is software program or hardware device that takes input from a random or pseudo-random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of randomness such as dice or coins, or they can be generated using a computer.  LAST RESORT if you cannot create a good, strong password.  Are great for those that need a password to use only once or twice.  Similar to password management but they are hard to guess when you don’t have access to your password manager.  Not heavily recommended for the normal computer user  A random password generator is software program or hardware device that takes input from a random or pseudo-random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of randomness such as dice or coins, or they can be generated using a computer.  LAST RESORT if you cannot create a good, strong password.  Are great for those that need a password to use only once or twice.  Similar to password management but they are hard to guess when you don’t have access to your password manager.  Not heavily recommended for the normal computer user

Summary Never write your passwords down. Never insert and save them on an unencrypted Microsoft word document, excel spreadsheet, or any other electronic documents, including Smartphone notepads. Easy to remember Passphrases or sentences are your best bet when creating a strong, secure password. Always use two-factor authentication when it is provided, especially with your financial and personal or smartphone app accounts. Are you considering a password manager and generator? Try them all out and choose which manager best suits your needs. Still unable to create a strong password or passphrase, use a password generator as your last resort. Lastly, when in doubt, contact your UTHSC Information Security Team or your UTHSC Helpdesk ! Never write your passwords down. Never insert and save them on an unencrypted Microsoft word document, excel spreadsheet, or any other electronic documents, including Smartphone notepads. Easy to remember Passphrases or sentences are your best bet when creating a strong, secure password. Always use two-factor authentication when it is provided, especially with your financial and personal or smartphone app accounts. Are you considering a password manager and generator? Try them all out and choose which manager best suits your needs. Still unable to create a strong password or passphrase, use a password generator as your last resort. Lastly, when in doubt, contact your UTHSC Information Security Team or your UTHSC Helpdesk !

Fun Fact: Most Used Passwords of password qwerty (Up 9) baseball password qwerty (Up 9) baseball dragon football monkey letmein abc mustang access shadow master michael superman batman trustno1 Condliffe, Jamie. "The 25 Most Popular Passwords of 2014: We're All Doomed." Gizmodo. N.p., 20 Jan Web. 20 Apr

THANKS!!!!

UTHSC Information Security Team L. Kevin Watson (901) Frank Davison (901) Jessica McMorris (901) Ammar (901) Information Security Website: security.uthsc.edusecurity.uthsc.edu To report phishing and spam forward it to UTHSC Help Desk: (901) ext. 1 or