NIMS MIDDLE SCHOOL PASSWORD BRIEF. What is a Password?  It is a string of alphanumeric characters that can be used to allow access to multiple things.

Slides:



Advertisements
Similar presentations
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Keep It Private VISD COMMON SENSE MEDIA CATEGORY: PRIVACY & SECURITY.
E-Safety By Ruby H and Tomasz. S.M.A.R.T S You will have to keep safe on the internet, don’t send a picture of yourself. M Only meet someone if you know.
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
Passwords suck Nico Smit November “The million passwords dilemma:”  Just like having a million keys suck, so also having a million usernames and.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Bullying… What you can do about it
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
What do I need to know?.   Instant Messages  Social Networking.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Internet Security Passwords.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
By Laura Trawin.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Internet Safety.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Information guide.
Planned Giving Design Center. What is the Planned Giving Design Center? National network of websites dedicated to advancing philanthropy.
Staying Safe Online Keep your Information Secure.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1 Safely Using Shared Computers Amanda Grady December 2013.
Protecting Your Personal Information November 15, 2013.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Network Security – Special Topic on Skype Security.
 Pretty much any kind of file can be sent on such as a photo or even a virus. .exe files are usually always viruses. (never open these even if.
Region 5 Portal Registration Guide 1 Portal Registration: A Quick Start Guide 12/31/08 Aum Sri Sai Ram Sathya Sai Baba Centers of North Central Region.
INTERNET SAFETY FOR KIDS
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Edit the text with your own short phrase. The animation is already done for you; just copy and paste the slide into your existing presentation.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Internet Safety.
How to be Kind Online A guide for children aged 7+
Port Knocking Benjamin DiYanni.
Dove science academy Cyber Club
Ways to protect yourself against hackers
Keep it private.
COMPUTER PRIVACY.
DOVE SCIENCE ACADEMY CYBER CLUB
R E A D What is cyber bullying? Hall
Feedback from people with learning disabilities
Internet Safety – Social Media
Presentation transcript:

NIMS MIDDLE SCHOOL PASSWORD BRIEF

What is a Password?  It is a string of alphanumeric characters that can be used to allow access to multiple things.  Access Doors  Computers  Websites  Passwords are a key component to Network Security and Internet Security.  There are many types of passwords that people use.

Types of Passwords  Passwords can be sent over the network in plaintext.  This means they can be intercepted and read easily.  Passwords can be sent while being encrypted.  This means that passwords that are used for access are encrypted and not easily intercepted.  They must be decrypted to be utilized.

Why Encrypt and Not Plaintext  Plaintext is just that, once someone sees your password they have access to whatever you utilize that password to access.  When you utilize encryption it tends to alter one’s thinking when they receive it, if they have thoughts of using your password.  It depends on what kind of encryption you utilize will determine how difficult it will be to crack.  When using encryption it protects not only you but the network that you are on and place you might be accessing.

Password Protection  You should protect your password at all times.  Never write down a password and leave it somewhere accessible.  A password should be something that only you would be able to remember.  Never share Passwords.

Protection Cont’d  Why is this important?  If you share a password with someone, you may not realize that it might give them access to multiple things.  You might give some access to a secure network.  If you share a password with someone, they might go share it with someone else and cause a “Domino Effect” where multiple people will have your password.

Protection Cont’d  If your password is compromised depending on the person and the situation will result in different implications.  If you share a password with a friend it can be turned into a joke.  A friend can play a joke on your own personal computer by modifying different things on your computer.  A friend can play a joke on a website that it gave them access to by making jokes or sending out funny s from a profile that you gave them access to.

Protection Cont’d  The Implications if a password is shared or compromised.  Someone has the possibility of getting access to a secure network.   Banking  Work Websites  School Websites  Etc…

Benefits of Sharing Passwords  These are very slim to none.  Have the possibility of giving a friend or family member access to a place where they might have a need to get.  It is just easier than creating multiple accounts.

Summary  What did we learn?  Password sharing/compromising is full of cons and limited on pros.  There is a reason passwords are implemented and that is why you should be vigilant when having them.  There are literally no benefits to password sharing or password compromising.  Lastly, ensure that you always protect your passwords at all time no matter who asks for them.

Questions?