Passwords Internet Safety for grades 9-12. Introduction to Passwords Become part of our everyday life –Bank cards, email, chat programs, on- line banking,

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Johnson Logistics Solutions Office of Systems and Information Technology.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Aaron Cauchi Nurse Informatics
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Session 7 LBSC 690 Information Technology Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
Component 9 – Networking and Health Information Exchange Unit 9-2 Privacy, Confidentiality, and Security Issues and Standards This material was developed.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Topic 5: Basic Security.
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Cybersecurity Test Review Introduction to Digital Technology.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Internet Safety.
2.4 Cyber-Safety.
Dove science academy Cyber Club
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Common Methods Used to Commit Computer Crimes
Lesson 3 Safe Computing.
Huntington Beach Public Library
Cybersecurity Awareness
DOVE SCIENCE ACADEMY CYBER CLUB
2017 TCS SMT Training - Dallas
Introduction to Computers
Electronic Mail.
Protecting Senior Citizens from Phishing s
Chapter 3: Protecting Your Data and Privacy
Computer Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Keeping Our Data Secure
Presentation transcript:

Passwords Internet Safety for grades 9-12

Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking, filing taxes,applying for financial aid Exists to protect you and prove your identity

Basic Functions of a Password Authenticates you to the computer or network that you are attempting to connect to Needed for a user to access an account Prevents others from accessing or damaging your personal data

Password Safety next next Password Guessing –Using programs Hacking Serious vulnerability –Making “educated” guesses External Disclosure –Overhearing a password –Finding a written password –Scene 1Scene 1

Password Security, Why? next next Private may be read Files may be viewed, changed or deleted Computer may be used to inflict damage on other systems Account may be used to send false information or threat s, appearing as if you are the sender Personal information or funds may be stolen Scene 2

Solutions: Things to Avoid Use a portion or variation name Base password on personal info Use words found in any dictionary Spell dictionary words or names backwards Use words with vowels removed Pair short words (dogcat) Use syllables or words from any language Use repeated character strings (ccaatt) Select less than 7 characters Include characters from literature or religion Include obscene words Never give it out! Scene 3

Solutions: Password Tips Use passwords with at least 7 characters Mix UPPER and lower case letters, numbers Use the first sentence of an uncommon song, poem, etc Use word fragments not in the dictionary Use short words separated by characters (dog^cat) Transliteration: This One – Th1$One Abbreviation from childhood verse (3BMcHTR) Phrases from movies Interweave two words (Dhouseog)

Conclusion Passwords help to protect and secure your personal information Choosing a good password is as important as having a good lock on your door Good hard to guess password need not be difficult to remember Be creative and Keep it private

Questions?