Creating/Remembering Secure Passwords Hain-Lee Hsueh Michael Duong.

Slides:



Advertisements
Similar presentations
Game Pitch Document presented by: Robert Rak. Abstract of game story Alien solar system located on the other side of our galaxy Four inhabitable planets.
Advertisements

Management lessons to learn from Chennai super Kings.
Positive And Negative Reinforcers For Your Child Psychology 121.
Examples of prologue. Flash Gordon It is a period of civil war. Rebel spaceships, striking from a hidden base, have won their first victory against the.
Module 3 Chess 101 Strategy Strategy refers to an overall plan to achieve a goal In every game you play your goal should be to checkmate your opponent,
STAR WARS Tomohumi Kamegawa Takuma Nakamukae Kenichi Kimura.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
An MMO Space Shooter/Strategy Game Bill Chang.  Humans have depleted resources on earth, and a newly discovered mineral is fueling civilization. Thousands.
Glasgow University Astrosoc presents 30 th Oct 2001 The Physics of Star Wars.
Monday, April 8 Please pick up the handouts on the small table: – One-Sheet for April 19 th (blue) – Archetypes and Hero’s Steps for movie.
Episode IV: A New Hope Luke Skywalker stays with his foster aunt and uncle on a farm on Tatooine. He is desperate to get off this planet and get to the.
Star Wars Return of the Jedi Hero Journey By: Arash Jahangir Period 2.
A Starwars Mitosis Story By Skylar DeLemos. A long time ago, in a galaxy far, far away… there lived an evil emperor named Darth Vader. He lived contently.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Networked Games - consistency and real-time Objectives – –Understand the problems associated with networked games. –Realize the importance of satisfying.
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Unit 25: Film/TV Studies TV Show Genre: Sci Fi By Connor McCallion.
Educational-Sporting Game Community Game. ► This is a game that suits children of 7-14 years of age. children of 7-14 years of age. ► The game is played.
L2: The Spanish American War and the Nature of American Imperialism American Foreign Policy Agenda Objective: 1.To explore stated reasons and concealed.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
In the name of God :).
Principles of Play The game of soccer is best understood and played when strategy and tactics are based upon certain principles.
Masters of the Universe Derek Altenburg Hamilton Foro Brian Kohlwaies Travis Langley Boris Poperny Matthew Prior.
Star Panzer Proposed by: Eric Nelson. Story Introduction The year is The peoples of earth have taken to the stars and explored the near reaches.
LEVEL 2:2.7 CONNECTIONS ACROSS TEXTS CONFLICT CONCEPTS.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
CS 4730 Action vs. Interaction CS 4730 – Computer Game Design Credit: Several slides from Walker White (Cornell)
Development Team Chase Killion Jordan Roller. Players will engage in real-time battles as commander or a grunt in Tank Wars. The game begins in "The Realm,"
Loglines FVP12 Sept Logline? What’s That? A log line or logline is a brief summary of a television program or film, often providing both a synopsis.
We are entering orbit of the eighth planet. They have sent transport co-ordinates.
Presentations Production © LoadingPlay! This loading is completely useless.
Economics Lesson Steps 8/3/11. Complete Class Procedures.
Game Balance.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
REVISION What is comic radiation and how is the Earth protected from it.
KEYS Scott Gajewski ART 389A Spring Contents Premise Getting Started -Players -Set-up -Materials Rules -Basics -Points System -Multiple Players.
INTERFACE COMPOSITION GAME DESIGN. OBJECTIVES After this lesson, students will be able to: Identify the Eight Golden Rules of Human-Computer Interface.
Rebel Alliance Red 5 Fall 2014 Angel Rosas Ashley Owens Kyle Kratt Nathan Allen.
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
Contested Dominion Game Treatment written by Nicholas Mezza.
Multiplying and Dividing Integers The ‘good guys’ against the ‘bad guys’
TRY NOW: What do you remember? A number that you can divide by 2. A number that only has two factors. A probability calculated using math. A probability.
Engagement Scenario (Mechs) Sandy Michael Thurid Steve.
CSCE 201 Identification and Authentication Fall 2015.
STAR WARS & STAR TREK BY Callum McGregor. STAR WARS CHARACTERS JEDI: SITH:
2D Game Design Pitch “Invasion” By: Tom Nanke. Abstract of Game Story It is the year 2190 and planet Earth is trying to salvage the last bit of civilization.
&. Common Core Curriculum Standards 9-12 Benchmark 1-C 8. Analyze and evaluate the causes, events and impacts of World War II from various perspectives,
Qualitative Spatial Analysis Part 2 Chris Mansley.
AB C D E Our informative Heads-Up Display has many useful features! The race timer (A) lets you know how long you've been racing. The mini-map (B) shows.
Talk often about God and His word (Deut 6:4-9).Talk often about God and His word (Deut 6:4-9). Show “real life” obedience (Deut 6:1-3, 16-19).Show “real.
You will be participating in a “game” with each group trying to accomplish specific goals (your goals will be distributed later). Your grade for this activity.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
War & Conflict 101. Sources of conflict Competition: “one-upper,” jealousy Opinions: argumentative or hostile to other views Misunderstanding: failure.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Artificial Intelligence and Video Games
Air Power “The ability to use platforms operating in or passing through the air for military purposes”
CYBER SECURITY PANDEMIC
Data Center Infrastructure
Star Wars Episode IV: A New Hope
WLCG Collaboration Workshop;
Escape rooms to unlock the creative skills in your right brain.
Star Wars Jedi Training
Protecting IT systems (2)
Security.
A LONG TIME AGO, IN A GALLAXY FAR, FAR AWAY…
Fairy Tale B-l-i-t-z.
Session 1 – Introduction to Information Security
Presentation transcript:

Creating/Remembering Secure Passwords Hain-Lee Hsueh Michael Duong

Secure And Memorable Passwords Problem: – Maintaining many random passwords is difficult to remember: BAD – Maintaining a single master password is extremely insecure: BAD – Short passwords utilizing common words: BAD

Secure And Memorable Passwords Possible Elaboration Strategies – Leverage personal word associations within the password (chunking) – Create a mental visual or story of the password that only makes sense to you – Establish an obscure but memorable connection between password and the thing being protected Example – PW for an amazon account: samtoucanfruitgoods

A long time ago in a galaxy far, far away…

Securing the New Hope

Rebel spaceships, striking from a hidden base, have won their first victory against the evil Galactic Empire. In anticipation of the empire striking back, the rebel forces decide to re- secure their galactic infrastructure to avoid enemy infiltration. You have been tasked to manage security access to all of the rebel forces’ vital resources. This entails creating memorable yet secure passwords to guard against unauthorized breaches, and granting access to legitimate entities. May the Schwartz be with you.

Core Mechanic You are captain of the command center, from which you can oversee all of the rebel resources hovering in space –E.g. weapon chambers, food reserves, infirmary ships, refueling stations, money vaults, docking stations, super laser control rooms Initially, all resources are unlocked; you need to create a distinct password to protect access to each resource During game play, additional resources (e.g. new food reserves) may be introduced that need to be secured

Core Mechanic Galactic Empire ships are trying to compromise rebel resources; you must lock each resource (by creating a secure password) before enemy ships reach them Failure to do so will result in a hostile takeover of the rebel forces, and captivity in carbonite

Core Mechanic Concurrently, rebel ships periodically need legitimate access, which you grant them by providing the password upon each request You get three attempts per resource to enter the password before the resource is indefinitely locked Failure to do so will result in exile to the distant planet of DANtooine* *Real Star Wars planet: