Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Subtitle Version or Date Presentation TitleIntroduction to using BCeSIS Module 2.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Team: SuperBad Cats MSIT 458 – Dr. Chen Authentication through Password Protection.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
K-2. Today’s Objective: I will create a strong, private password.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
What is E-commerce Safety Precautions Password Strengths
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Mrs. Dennis South Media Specialist Mrs. Bakanas North & South Media Specialist Mrs. Martinez North Media Specialist Mrs. Kelley Media Assistant Miss VanArtsdalen.
Staying Safe Online Keep your Information Secure.
CIS 450 – Network Security Chapter 8 – Password Security.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Database Security DB0520 Authentication and password security Authentication options – strong, weak Review security environment - Sys Admin privileges.
Security Planning and Administrative Delegation Lesson 6.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,
Meditech is the EMR system utilized by St. Mary’s Health Care System and can be accessed remotely from your home/office. If needed, our physician liaison.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Password Management Strategies for Online Accounts Shirley Gaw, Edward W. Felten Princeton University.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
“L  kout” Initiative Choosing a Strong Password.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.
Good strong passwords are key to keeping your access and data safe.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Today’s lesson title is: Network Password Rules Be ready to take some notes… about 24 slides 1.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Jamie Salazar.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Understanding Security Policies Lesson 3. Objectives.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Understanding Security Policies
Key words: Secure | Password | Character
Password Protection: How Safe Are Your Passwords?
Password Management Limit login attempts Encrypt your passwords
Lesson 2: Epic Security Considerations
Chapter 3: Protecting Your Data and Privacy
Lesson 2: Epic Security Considerations
Protecting Your Password
Lesson 2: Epic Security Considerations
Creating Passphrases Include Examples NOT REQUIRED
Understanding Security Policies
Presentation transcript:

Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck

Building Structures. Building Relationships. 1.Ease the Burden of Remembering Multiple Passwords 2.Keep Access to Information Secure 3.Eliminate Need for “Post-It Passwords “ 4.Educate Users How to Coordinate Passwords to Multiple ProgramsObjectives

Building Structures. Building Relationships. Password Creation Tips 1. Do not use personal information. You should never use personal information as a part of your password. It is very easy for someone to guess things like your last name, pet's name, child's birth date and other similar details.

Building Structures. Building Relationships. Password Creation Tips – (cont’d) 2. Do not use real words. There are tools available to help attackers guess your password. With today's computing power, it doesn't take long to try every word in the dictionary and find your password, so it is best if you do not use real words for your password.

Building Structures. Building Relationships. Password Creation Tips – (cont’d) 3. Mix different character types. You can make a password much more secure by mixing different types of characters. Use some uppercase letters along with lowercase letters, numbers and even special characters such as '&' or '%'.

Building Structures. Building Relationships. Password Creation Tips – (cont’d) 4. Use a passphrase. Rather than trying to remember a password created using various character types which is also not a word from the dictionary, you can use a passphrase. Think up a sentence or a line from a song or poem that you like and create a password using the first letter from each word. For example, rather than just having a password like 'yr$1Hes', you could take a sentence such as "I like to read the About.com Internet / Network Security web site" and convert it to a password like 'il2rtA!nsws".

Building Structures. Building Relationships. Password Creation Tips – (cont’d) 5. Use different passwords. You should use a different username and password for each login or application you are trying to protect. That way if one gets compromised the others are still safe. Another approach which is less secure, but provides a fair tradeoff between security and convenience, is to use one username and password for sites and applications that don't need the extra security, but use unique usernames and more secure passwords on sites such as your bank or credit card companies.

Building Structures. Building Relationships. Password Creation Tips – (cont’d) 6. Change your passwords. You should change your password at least every 30 to 60 days. You should also not re-use a password for at least a year.

Building Structures. Building Relationships. Active Directory -Network 1.Minimum Character Length is 6 2.Must Change Every 90 Days 3.5 Passwords Remembered 4.No Lockout for Bad Password 5.Complexity Rules Apply (see next slide)

Building Structures. Building Relationships. Active Directory– (cont’d) Complexity Rules Not contain all or part of the user's account name Be at least six characters in length Contain characters from three of the following four categories: English uppercase characters (A through Z) English lowercase characters (a through z) Base 10 digits (0 through 9) Non-alphabetic characters (for example, !, $, #, %)

Building Structures. Building Relationships.CDM/IR

CDM/IR – (cont’d)

Building Structures. Building Relationships. CDM/IR – (cont’d)

Building Structures. Building Relationships. CDM/IR – (cont’d)

Building Structures. Building Relationships. CDM/IR – (cont’d)

Building Structures. Building Relationships.Timberline

Timberline – (cont’d)

Building Structures. Building Relationships. Timberline – (cont’d)

Building Structures. Building Relationships. Timberline – (cont’d)

Building Structures. Building Relationships.SametNet

SametNet – (cont’d)

Building Structures. Building Relationships. SametNet – (cont’d)

Building Structures. Building Relationships.SuccessFactors

SuccessFactors – (cont’d)

Building Structures. Building Relationships. SuccessFactors – (cont’d)

Building Structures. Building Relationships.ADP

ADP –(cont’d)

Building Structures. Building Relationships. ADP –(cont’d)

Building Structures. Building Relationships. ADP –(cont’d)

Building Structures. Building Relationships. ADP –(cont’d)

Building Structures. Building Relationships. ADP –(cont’d)

Building Structures. Building Relationships. Password Creation Tips – (cont’d)

Building Structures. Building Relationships.Questions?