STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,

Slides:



Advertisements
Similar presentations
101 Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
K-2. Today’s Objective: I will create a strong, private password.
How to Login into SSA ?. Home Page Click on My Profile.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Online Job Applications. Course Outline Review resources & information needed to complete an online application Practice filling out a job application.
Threats to I.T Internet security By Cameron Mundy.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Donette Mullinix ED 505 UWA Clipart:
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
1 Safely Using Shared Computers Amanda Grady December 2013.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
Textual Password How to use the Textual Authentication Model (AC)
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Internet Safety Tips.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
 Make sure you are near an adult so that you can ask questions and report anything suspicious.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By :Mitchell Christie by :Mitchell Christie safety.
Cyber Safety Jamie Salazar.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
How to set up an account- Non-Technical Aimee Lilley.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Gmail customer service, A 3 rd party firm working to tackle and resolve technical issue faced by Gmail account users. In today’s post experts presenting.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
3.2 Introduction to .
An Introduction to Phishing and Viruses
Dove science academy Cyber Club
Protecting What’s Yours: Your Identity
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
DOVE SCIENCE ACADEMY CYBER CLUB
Digital $$ Quiz Test your knowledge.
3.2 Introduction to .
Passwords.
Introduction to Computers
Keep It Safe! Secure Your Secrets
start to finish – November 20181

Passwords Why all the bother?.
Safe, secure and empowered
Presentation transcript:

STRONG PASSWORDS = SELF-PROTECTION

Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday, social security number, contact information, etc.) Passwords protect hackers from accessing stealing or using in an unauthorized manner your intellectual property (files, assignments, etc.), and your money (credit card information…). Passwords protect hackers from entering your social profiles ( accounts, FaceBook, Twitter, etc.), obtaining contact information for all of your friends, and sending out messages in your name.

What makes a strong password? Elements of a password: letters (uppercase and lowercase), numbers, symbols A strong password has a combination of all character types, and exceeds 8 characters.

Dos and Don’ts Don’t… reuse passwords, use words found in dictionaries or easily guessed, or include personal information Do…Select 8 Characters combined in a manner difficult to guess Method: Start with a phrase. SoccerMama Lengthen the phrase based on the purpose of the password. SoccerMamaVista Scramble the phrase, replacing letters with symbols or numbers so it can’t be found in a dictionary or easily guessed. Strong resulting password: So((er3amaVista

ANY QUESTIONS?