Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

L kout Initiative Choosing a Strong Password Office of Information Technology.
Subtitle Version or Date Presentation TitleIntroduction to using BCeSIS Module 2.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Secure Computing Series Computer Password Safety.
Today’s Objective: I will create a strong, private password.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
©Holm Publications Security Awareness Presentation.
Database Security DB0520 Authentication and password security Authentication options – strong, weak Review security environment - Sys Admin privileges.
Security Planning and Administrative Delegation Lesson 6.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
SCC Student Technology Access Student Login Guide SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login User name – this.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Security Compact.  Only authorized security administrators shall be allowed to create a user account for the PowerSchool application.  The LEA security.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
“L  kout” Initiative Choosing a Strong Password.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Fraud Protection.
Fraud protection.
Key words: Secure | Password | Character
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Password strength Dr. X.
Protecting What’s Yours: Your Identity
Password Management Limit login attempts Encrypt your passwords
Choosing a Strong Password
Passwords.
Introduction to Computers
Choosing a Strong Password
Lesson 2: Epic Security Considerations
Chapter 3: Protecting Your Data and Privacy
Keep It Safe! Secure Your Secrets
Protecting Your Password
start to finish – November 20181
Choosing a Strong Password
Safe, secure and empowered
Keeping Our Data Secure
Presentation transcript:

Password Fundamentals

UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three of the four following classes of characters.  English uppercase letters (A, B, C).  English lowercase letters (a, b, c).  Special characters ( !, *, $, or other punctuation symbols).  Arabic numerals (1, 2, 3). Passwords must be changed every 90 days. Passwords cannot be reused for 1 year.

Summary A password is the key to the Dental Schools resources. A strong password can protect your personal account. Take strides to make strong passwords that are not obvious to someone familiar with you. Remember to change your password at least every 90 days.

Why passwords are important They are the entry point to IT and other enterprise resources. They provide access to the VPN, servers, and the network. Misused or stolen passwords can give intruders access to your personal info.

Internal password theft is easy “Social engineering” is one of the easiest ways for intruders to compromise networks and other organizational systems. Others can hear you give a password to someone you trust. Someone looking over your shoulder can discover a password. Don’t keep a copy of your password in a desk drawer, on a monitor, or under a keyboard.

Protect your password Your password is yours alone. Don’t share it with anyone, including supervisors, personal assistants, or IT personnel. Never write down your password. You wouldn’t write your PIN number for your ATM card, would you? Do NOT: Say your password aloud. your password to a co-worker. Offer anyone hints about what your password might be.

Create a strong password Weak passwords are common because: They are easy for users to remember. They include personal information about the user. They consist of known words that can be found in many hacker password dictionaries. They contain number or letter sequences or letter-to-number substitutions, such as E for 3 or O for zero.

Create a strong password Strong passwords: Are eight characters or longer. Can’t contain any part of a user’s full name or username. Don’t use any term that could easily be guessed by someone who is familiar with you. Should not include any personal information, e.g., the name of a spouse or a street address.

Create a strong password Strong passwords, cont.: Should not contain personal identification numbers, including those on a license plate, your telephone number, birth date, or any part of your Social Security number. Contain characters from three of the four classes of characters.

The four character classes are: English uppercase letters (A, B, C). English lowercase letters (a, b, c). Arabic numerals (1, 2, 3). Special characters ( !, *, $, or other punctuation symbols).

Examples of bad passwords Sports teams or terms: LouvlleSlgr Number sequence: *12345* Letter string: AAAAAA Mixed-case sequence: ABcdEFgh Company name: AcmeIT Keyboard sequence: QwERty or ASdFgh

Variations on a theme are still weak Original password: BobJones DentalSchool Tiger Login Password Modified password: BJones25 1DentalSchool1 Regit Log-in Always avoid this word or anything similar to it

Better passwords Original password: LouvlleSlgr AcmeIT QwERty BJones25 1DentalSchoo1 New password: L*6v11E5Lgr aC&3i7 Y7#RQ^e 890NEs2% !DEnta1SchOo1