Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Johnson Logistics Solutions Office of Systems and Information Technology.
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
Word Lesson 3 Helpful Word Features © 2012 M and K Solutions, LLC -- All Rights Reserved.
Tom Parker Project Manager Identity Management Team IT Security Group.
Internet Security Passwords.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Secure Computing Series Computer Password Safety.
Online Job Applications. Course Outline Review resources & information needed to complete an online application Practice filling out a job application.
Threats to I.T Internet security By Cameron Mundy.
How To Protect Your Privacy and Avoid Identity Theft Online.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
To navigate through this slideshow, use the arrow keys on your keyboard to go forward or backward.  or  Use your mouse to click to the next step within.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
David Abarca, Instructor Del Mar College Computer Corner Passwords, Passwords Everywhere !
Password Management PA Turnpike Commission
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Software that can create and remember different passwords for different sites.
Downloading and Installing Autodesk Revit 2016
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Protecting Your Password
Good strong passwords are key to keeping your access and data safe.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By, Jason Arthur HOW TO MAKE A SECURE PASSWORD. INTRO For some people it may be hard to make a safe and secure password, and some people think their password.
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
Internet safety By Kyle Allan. Top tip No:10 Don’t give out personal information such as a : Phone numbers and also addresses.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Passwords Aim: To create a strong and safe password.
Phishing and online fraud What parents need to know.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Confidentiality, Integrity, Awareness What Does It Mean To You.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Internet: The Nursing Resource. Is the INTERNET a government association? Yes No.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Data Protection & Network Security Data Protection Protective Marking Secure Printing Passwords & the Internet Viruses Encryption.
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Internet Safety.
2.4 Cyber-Safety.
Key words: Secure | Password | Character
Password strength Dr. X.
Protecting What’s Yours: Your Identity
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Information Technology Services Education and Awareness Team
Check the buttons at the bottom of your Alert
Setting up an online account
2.4 Cyber-Safety.
Protecting Your Password
Information Technology Services Education and Awareness Team
Presentation transcript:

Creating STRONGCreating STRONGPasswords

CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information safe online We will cover important tips in this presentation that will help you create a strong password.

Make your passwords long 8 or more characters is a good length TIP #1 - LENGTHTIP #1 - LENGTH

Include letters, punctuation, symbols, and numbers. Use the entire keyboard, not just the letters and characters you use or see most often. TIP #2 - COMPLEXITYTIP #2 - COMPLEXITY

The greater the variety of characters in your password, the better. However, password hacking software automatically checks for common letter-to- symbol conversions, such as changing "and" to "&" or "to" to "2." TIP #2 - COMPLEXITYTIP #2 - COMPLEXITY

Don't use the same password for everything! Cybercriminals steal passwords on websites that have very little security, and then they use that same password and user name in more secure environments, such as banking websites. TIP #3 - VARIETYTIP #3 - VARIETY

To keep strong passwords effective, change them often. Remind yourself to change your passwords every three months or so. TIP #4 - VARIATIONTIP #4 - VARIATION

Dictionary words in any language. Words spelled backwards, common misspellings, and abbreviations. Top Worst Passwords of 2012: 1. password abc qwerty Source: TIP #5 – THINGS TO AVOIDTIP #5 – THINGS TO AVOID NEVER use these as your passwords

Sequences or repeated characters. Examples: , , abcdefg, or adjacent letters on your keyboard (qwerty). Personal information. Your name, birthday, driver's license, student number, passport number, or similar information. TIP #5 – THINGS TO AVOIDTIP #5 – THINGS TO AVOID

There are many ways to create a long, complex password. Here are some suggestions that might help you remember it easily: EXAMPLE

Click on the link below to test the strength of your password: security/password-checker.aspx TESTING THE STRENGTHTESTING THE STRENGTH

REMEMBER YOUR PASSWORDSREMEMBER YOUR PASSWORDS Having multiple complex passwords can be complicated You must find the best way to remember them (but always keep your passwords secret!)

SOURCE