Password Management PA Turnpike Commission

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

L kout Initiative Choosing a Strong Password Office of Information Technology.
Password Security How secure are your passwords ? Why do we need passwords or do we need them ? Should they be simple or complex ? When should we assign.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
Tom Parker Project Manager Identity Management Team IT Security Group.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
How to Login into SSA ?. Home Page Click on My Profile.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
 Logging students onto the Ultranet.. Log on Dates  3 trial grades weeks 4 & 5  All students weeks 6 & 7  Trial group of parents week 8  All parents.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
“L  kout” Initiative Choosing a Strong Password.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Good strong passwords are key to keeping your access and data safe.
How to Reset Your APICS Password Tutorial Also available at:
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Prepare to set up you new Gmail Account. What are you using? Software Program Name Owned bySoftware Location Outlook ExpressMicrosoftOn Your Computer.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Networks. Learning Objectives: By the end of this lesson you should be able to:
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Username Usage and Password Security. Username Usage.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
A Guide to Using SMART eR Online Ordering (Electronic Requisitions) Managing Employee Timeoff, Electronic W-2s, Etc… 1.
Internet: The Nursing Resource. Is the INTERNET a government association? Yes No.
Understanding Security Policies Lesson 3. Objectives.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Technology Orientation Access Account Your Access Account is your access to University services such as , the Internet, WebMail, ANGEL, e-Lion,
PASSWORD SECURITY A Melbourne Athenaeum Library
Understanding Security Policies
Choosing A Username and Password
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Information Systems Desktop Support
Choosing a Strong Password
Setting up an online account
Passwords.
Choosing a Strong Password
Epic Introduction Basics
Epic Introduction Basics
Keep It Safe! Secure Your Secrets
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Choosing a Strong Password
Understanding Security Policies
Presentation transcript:

Password Management PA Turnpike Commission

Creating Strong Passwords Passwords must be: At least 8 characters in length. A mix of letters (uppercase and/or lowercase), numbers, and/or special characters. Some people find that creating a passphrase is easier to remember than a password. A passphrase is a complex password based on a memorable phrase, song or book title, line of poetry, etc.

Creating Strong Passwords Passwords should not be: A word found in the dictionary, whether spelled forwards or backwards, or a word preceded or followed by a digit (e.g., secret1, 1secret). The User ID. Personal information, names of family, places, pets, birthdays, address, hobbies, or any other information that could be associated with you. Words that are slang, dialect, jargon, etc. Common keyboard sequences, such as "qwerty89" or "abc123”.

Creating Good Passphrases Passwords should: Not be too common (2bor!2b is pretty common!). Be a phrase that has personal meaning but might not appear widely. For example, the first line of your wedding vows (if you wrote them yourself) would be memorable but not widely available. A random line from your favorite movie is good too. Combine phrases to make them even stronger. Not be passphrases you have seen in print as examples.

Password Policy Issues Passwords should not be written down or stored electronically. Choose passwords that you can remember without writing them down. If you do have to write something down, write a hint that others won’t be able to decipher instead of the complete password - and store it securely. Change initial passwords, password resets, and default passwords the first time you log in. These passwords can be vulnerable to guessing or to the automated programs that hackers employ to try to break into systems. Verify that all of your passwords meet the password strength guidelines in this module. Change any that do not.

The different modules of this tutorial will: Discuss the risks to your computer and the data it contains. Provide some guidelines for avoiding risks. Suggest some practical and easy solutions. Please review these modules at your convenience.