Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.

Slides:



Advertisements
Similar presentations
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Yvan Cartwright, Web Security Introduction Correct encryption use Guide to passwords Dictionary hacking Brute-force hacking.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Session 7 LBSC 690 Information Technology Security.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Information Security. Survey Results Question What do you think Information Security is?
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Jamie Salazar.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Computer Security Sample security policy Dr Alexei Vernitski.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Challenge/Response Authentication
Common Methods Used to Commit Computer Crimes
Protecting What’s Yours: Your Identity
Safe Internet Mechatronika Budapest.
Technology for Tomorrow
Cyber Security By: Pratik Gandhi.
Cybersecurity Awareness
Setting up an online account
Introduction to Computers
Lesson 2: Epic Security Considerations
Internet Safety – Social Media
Cybercrime By: Kimberly Foreiter
Presentation transcript:

Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.

Quote of the Day: Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months.” Clifford Stoll- astronomer, author, and the first to utilize “digital forensics” successfully

IN A WORLD… Where you don’t have any access to your online life, how would you cope? What would you miss the most?

Recent Major Security Breaches Lulz Security hacks Sony Pictures website –Releases 50,00 users’ information Rouge members of hacker-collective Anonymous hack Playstation Network and Quiriocity –All user information made available LulzSec strikes Sony again with and exploit of the PSN password reset solution URL –Prevents owner of account from fixing prior hack LulzSec logo

So… What can I do to make sure my information is safe? In the case of the URL exploit and sonypictures.com hacks, very little –These were simple errors made by Sony techs; a (technologically speaking) basic error was made in each case.

Anything involving the internet is inherently more risky then anything not leaving your computer. Passwords are the front line of defense. Most people’s are not strong enough to withstand a brute-force database attack; today we are going to look at how best to strengthen our passwords

CONCERN: It’s too easy to hack a password This is true… but only IF the password is weak.

FOR EXAMPLE: CHS defaults to using “panthers” as the password for any accounts made by the school. If this is left unchanged for too long the security of the account would be compromised. This password only contains lowercase letters; introducing a variety of characters, such as “Panthers,” or, even better, “PaNtHeRs,” increases the password strength considerably.

QUESTION: Does it matter if 2+ people use the same password Only if that same password is overly simple or obvious. For the Pokemon Tower Defense game, 2000 accounts share the password of “pokemon.” Though trivial in this case, matching application and password is an awful habit to develop. If 2+ people shared the password “ILikeCheezBurgurz” as their password for their bank account, the odds of this being an issue are significantly lower (though this is still not the best password one could use… more on that shortly).

QUESTION: How secure are passwords, really? In terms of their strength; as secure as you make them. In terms of their safety; as secure as the site’s database security, and as secure as you physically make them.

QUESTION: are there ways to get into my accounts without my password? If the database storing your information is compromised then yes, it is possible. These attacks are less frequent then brute-force attempts for a single users password, and more far reaching- many people will be affected at the same time as you are.

Is it possible for passwords to be stolen if your computer is infected with a virus or does not have a firewall? ABSOLUTELY Viruses can check your browsers saved passwords, log keystrokes, or send your data to places other then where you think you are sending them. Firewalls prevent people from accessing your computer remotely, and using encrypted internet access prevents data sniffing to discover your information.

To protect your information: Use a STRONG password Keep your password safe Be smart when using the internet

The accounts I have behind passwords are unimportant; why should I care? These accounts are tied to your - which you probably use for a very long time to come. Many people reuse passwords across sites; a breach in one site could then lead to total loss of security across all sites.

Password importance ctnd Those passwords could be, or could at least lead, a hacker to your password for your bank account later in life. Preparing now with good habits and solid defenses that will be effective in the future when your life and livelihood are shielded by a password will help prevent crippling identity theft and related troubles later in life.

What constitutes a strong password? Paradoxically, the strongest password you can have is the one you cannot remember. Software solutions exist to this end- anything else is probably not feasible as it would be inherently less secure (i.e. writing your password down on a piece of paper and putting it next to your computer.

Software solution? Lastpass.com lets you register an account and, behind a super-strong password you create, hides your other passwords for access to any sites you use. Includes a password generator, produces passwords you do not have to remember that are very strong One password to remember, accessible from anywhere.

How do I create a strong password? Utilize different characters –i.e. symbols, numbers and upper/lower case numbers Avoid standard patterns –Most passwords using capital letters have them as the first character and last; mix this up and capitalize other letters instead

Strong Password Creation ctnd. Use multiple “phrases” instead of a single idea password –Instead of “iLoveMyDog2002” (perhaps 2002 is the year you got your dog?) use “1994ILoveMyDog2002” (possibly the year of your birth) –This maintains the “memorality” of the password for yourself while making it more difficult to brute-force guess the code as it does not follow a single logical progression

How long should my password be? According to recent studies performed at the Georgia Tech Research Institute, due to modern hardware power- specifically within the GPU- any password with less then 12 characters is far too weak, and should be changed as soon as possible.

Exit Activity Using what has been discussed in this power point, on your own (for security’s sake!) come up with a memorable but strong password. If possible, avoid writing it down.