User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Password Cracking Lesson 10. Why crack passwords?
Password Policy: Update Recommendations Identity & Access Management Committee September, 2012.
Team: SuperBad Cats MSIT 458 – Dr. Chen Authentication through Password Protection.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
College of Information Technology & Design
Matt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern Presented by Erik Archambault.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
1. 2 Overview of AT&T EPIC Ordering Process for SUS (Supply Order) Suppliers 1.AT&T User creates shopping cart on internal web-based portal 2.Shopping.
ASCII and Unicode. ASCII Inside a computer, EVERYTHING is a number – that includes music, sound, and text. In the early days of computers, every manufacturer.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
To navigate through this slideshow, use the arrow keys on your keyboard to go forward or backward.  or  Use your mouse to click to the next step within.
Password Management PA Turnpike Commission
Chapter The Basics of Counting 5.2 The Pigeonhole Principle
CIS 450 – Network Security Chapter 8 – Password Security.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Kevin Killourhy Visualization & Usability Group Information Access Division Information Technology Laboratory Usability Research in Support Of Cyber-Security:
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
1 Languages. 2 A language is a set of strings String: A sequence of letters Examples: “cat”, “dog”, “house”, … Defined over an alphabet:
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
Region 5 Portal Registration Guide 1 Portal Registration: A Quick Start Guide 12/31/08 Aum Sri Sai Ram Sathya Sai Baba Centers of North Central Region.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.
Good strong passwords are key to keeping your access and data safe.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Joshua Fuller. - Passwords keep your information private - Never tell your password to ANYONE - Change your password regularly Basic Security.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Namespaces cs3353. Namespace Domain A computer system namespace domain is created and maintained to: –standardize the policy for names –prevent name collisions.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Understanding Security Policies Lesson 3. Objectives.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
PASSWORD SECURITY A Melbourne Athenaeum Library
LastPass Password Management
Understanding Security Policies
Key words: Secure | Password | Character
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Welcome! To the ETS – Create Client Account & Maintenance
Locked.
PASSWORDS Unique is Good.
Password Cracking Lesson 10.
Passwords.
Computer Usage.
Creating Passphrases Include Examples NOT REQUIRED
Password Awareness.
Safe, secure and empowered
Presentation transcript:

User Management: Passwords cs3353

Passwords Policy: “Choose a password you can’t remember and don’t write it down”

Passwords Of the 200 most common passwords, at least one was used at every site tested [Grampp & Morris].

Passwords Users will spare no creativity when it comes to working against the password policy

Making a Secure Password User practice (in general): – Users don’t like long passwords – Users don’t like to type complex character strings – Users don’t like to change their passwords often

Making Secure Passwords User behavior requires the SA to create a set of enforceable guidelines for password creation.

Making a Secure Password Use a combination of characters that includes: – Digits – Punctuation marks – Alphabet letters – Possibly other special characters?

Making a Secure Password Passwords to exclude: – Proper nouns – Dictionary words from any language – Consecutive letters or digits

Making a Secure Password Require passwords to be changed occasionally: – Example: Once per year Set the rules on minimum and maximum password lengths: – minimum is 6-10 characters (is 6 is too short?) – maximum is characters – Some password applications have limits on password length

Making a Secure Password The longer and more complex the password, the harder it is to crack. – Long complex passwords are difficult to remember and difficult to type.

Password Experiment A: Control group – choose any password you like. B: Passphrase group – use a passphrase C: Random P-word group – random characters are used.

Password Experiment The successful cracking rate was: – A = 30% – B = 10% – C = 10%

Password Experiment Forgetting your password – Groups A and B had the same rate – Group C had a significantly higher rate, and were more likely to record their password somewhere.

Making a Secure Password There are websites that rate password strength, but be careful how you use such a site.

Making a Secure Password Methods – Formula: Prefix Infix Postfix – Catch-phrase Use the first letter of each word in an easy to remember catch-phrase.

Making a Secure Password Formula Example – Prefix: – Infix: – Postfix: Bank password example: per$wgh29_BoO per=personal $ and_ are the field separators wgh = Warren G. Harding, 29 th president of US BoO = Bank of Oklahoma

Making a Secure Password Catch phrase: – Admiral Nelson defeats French at Trafalgar. Becomes the password: