©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

UNIT 20 The ex-hacker.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Prepared by: Nahed Al-Salah
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Chapter 10 Privacy and Security McGraw-Hill
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
How to Login into SSA ?. Home Page Click on My Profile.
Do you know how to keep yourself safe?
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Password Management PA Turnpike Commission
Staying Safe Online Keep your Information Secure.
What does “secure” mean? Protecting Valuables
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
“L  kout” Initiative Choosing a Strong Password.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
INTERNET SAFETY FOR KIDS
Topic 5: Basic Security.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Computer Security By Duncan Hall.
Introduction to Computer Security
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Any criminal action perpetrated primarily through the use of a computer.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Communicating safely and appropriately online. Why do we need passwords?
8 – Protecting Data and Security
What strategies could you use to learn more effectively?
Communicating safely and appropriately online
Fraud Protection.
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Unit 4 IT Security.
Information Systems Desktop Support
Choosing a Strong Password
Security in Networking
Cybersecurity Awareness
Passwords.
Introduction to Computers
Choosing a Strong Password
Lesson 2: Epic Security Considerations
Objectives Telecommunications and Network Physical and Personnel
Keep It Safe! Secure Your Secrets
Lesson 2: Epic Security Considerations
Protecting Your Password
Lesson 2: Epic Security Considerations
Presentation transcript:

©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”

©2002 TechRepublic, Inc. All rights reserved. A Matter of Balance There is an inverse relationship between convenience (ease- of-use) and security. As you increase security, you lose convenience. Convenience Security

©2002 TechRepublic, Inc. All rights reserved. What is Security? Webster’s Dictionary: Measures taken to guard against espionage or sabotage, crime, attack, or escape H. Stanley Judd: The ultimate security is your understanding of reality.

©2002 TechRepublic, Inc. All rights reserved. Threat Categories Natural Disasters – Fire, flood, tornado, etc. Nonhuman – Product failures, bugs, etc. Human ☹ Malicious:  Insiders – Disgruntled employees  Outsiders – Hackers, crackers, etc. ☹ Nonmalicious: Untrained or uninformed employees

©2002 TechRepublic, Inc. All rights reserved. One of the Company’s Most Valuable Assets The information stored in computer files on our desktop computers and on the local area network

©2002 TechRepublic, Inc. All rights reserved. Profiles: Who’s Breaking In? Corporate spies Governments Terrorists Career criminals Insiders Financial, competitive gain National interests Religious, political ideals Financial, control/power Financial, revenge

©2002 TechRepublic, Inc. All rights reserved. What Makes Us Vulnerable? Easily guessed passwords – Too short; too simple; common words Not keeping secrets – Writing passwords down; sending confidential data in s Trusting things we get from others – Opening attachments that have a virus or other malicious code

©2002 TechRepublic, Inc. All rights reserved. Password A string of characters, entered to verify that you are authorized to access computer resources, consisting of: Alphabetic – A to Z and a to z Numeric – 0 to 9 Special Characters – ~; #; $; %; ^; &; *; (; ); +; =; [; ]; {; }; /; ?; ;,; ;; :; \; |; `; ’; ”;.

©2002 TechRepublic, Inc. All rights reserved. Problems with Passwords There is a direct relationship between the ease with which a password can be remembered and the ease with which it can be guessed. Without a gimmick, a password that is difficult for an unauthorized person to guess is usually difficult for a user to remember (more about gimmicks later). If a password is easy to remember, it is probably easy for someone else to guess.

©2002 TechRepublic, Inc. All rights reserved. Password Security Don’t tell anyone your password. Don’t write your password down anywhere. Make sure your password cannot be easily guessed. If you think there is even a slight chance someone knows your password, change it. Don’t let someone see what you are entering as your password.

©2002 TechRepublic, Inc. All rights reserved. Don’tWeak Don’t Choose a Weak Password: With fewer than eight characters. That could be found in a dictionary. That uses public information about you or your family or friends (Soc Sec #; birthdate; credit card number; telephone number, etc.). That you have used before. That is a variation of your user ID. That is something significant about you.

©2002 TechRepublic, Inc. All rights reserved. DoStrong Do Choose a Strong Password: That is at least eight characters long. That contains uppercase and lowercase letters. That contains at least one number or special character. That is not a dictionary word in any language, slang, or jargon. That cannot be easily guessed and is easy to remember. Remember to change your password every 90 days.

©2002 TechRepublic, Inc. All rights reserved. Weak Weak Passwords (examples): cat dog diego querty hart heat heart mary 1dennis2 hartelephone lintelco hartwell eednyw ydnew kayak palindrome september superman mickeymouse r2d2 aaaabbbccd a1b2c3d4 zxcvbnm bonvoyage mercibeaucoup volkswagen mircrosoft colorprinter windows98 nowisthetimeforallgoodmentocometotheaid

©2002 TechRepublic, Inc. All rights reserved. Strong Strong Passwords (examples): Wwe&nadtd2BoN2bTist? IsfgaWDo63bmstfw1491 Mdi#1imh52eobbowtffcd tmb1W2rpwmkrG8b$ I know what you are thinking: “Wait one minute, you geek – you said it must be easy to remember!” mnemonics. Let me explain mnemonics.

©2002 TechRepublic, Inc. All rights reserved. Mnemonics Mnemonics Made Easy Take a phrase that is easy for you to remember and convert it into characters. It could be the first line of a poem or a song lyric. “Water, water everywhere and not a drop to drink” (Rhyme of the Ancient Mariner) converts to Wwe&nadtd. “We Three Kings from Orient Are” converts to w3KfOr3691. (3691 is the year 1963 spelled backward to extend beyond six characters.)

©2002 TechRepublic, Inc. All rights reserved. Protect the Security of the Company’s Information As If Your Job Depends on It, Because… IT DOES!