Username Usage and Password Security. Username Usage.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

L kout Initiative Choosing a Strong Password Office of Information Technology.
Part I: Making Good Online Choices
 Familiarize yourself with the Internet  Utilize site/content blocking software and/or parental controls  Randomly check your child’s and Internet.
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
PowerChart Basics Session 1 June Goal: To acquaint the user with the basics of PowerChart patient information security. Objective: 1.State the importance.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
Tom Parker Project Manager Identity Management Team IT Security Group.
Passwords They can be easy but very difficult to crack.
K-2. Today’s Objective: I will create a strong, private password.
Online banking Using the internet for your banking.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Today’s Objective: I will create a strong, private password.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
To navigate through this slideshow, use the arrow keys on your keyboard to go forward or backward.  or  Use your mouse to click to the next step within.
Password Management PA Turnpike Commission
Staying Safe Online Keep your Information Secure.
s By Mollie.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
HumanaVitality® Instruction Guide: Registering for Humana Vitality and Completing your Health Assessment GCHHVG4EN.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
NY Public Library Student Cards LOGIN at NYPL.ORG.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Scenarios Grab your headphones to listen. Press F5 to play.
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Safeguarding your Identity While Online i-Safe, Inc.
“L  kout” Initiative Choosing a Strong Password.
Thank you for being our MVP. Directions: The following slides present a basic outline for your presentation. Feel free to be creative with your backgrounds,
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
How to set up an account- Non-Technical Aimee Lilley.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Issue Date January OKLAHOMA STATE IMMUNIZATION INFORMATION SYSTEM I IMMUNIZE. SAVE LIVES. Accessing OSIIS as a View Only User.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
CREATING PASSWORD SAFETY By: Kyra Scoby-Hamilton.
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Internet Safety.
Key words: Secure | Password | Character
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Information Systems Desktop Support
Choosing a Strong Password
Protecting your personal information and privacy
Passwords.
Electronic Mail Opening Activity: 411 of
Passwords.
Choosing a Strong Password
Keep It Safe! Secure Your Secrets
Protecting Your Password
Choosing a Strong Password
Keeping Our Data Secure
How to set up your account
Presentation transcript:

Username Usage and Password Security

Username Usage

Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt

Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch

Good or Bad? I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens AmrcanIdol2 BellaIsabella DarkAngel666 Karla-Love-1996 SimplyMe gun4hiRe babyfaceLA Watup?

Group Project Create at least 3 different screen names that you think will meet all of these guidelines: 1.Names that are not likely to attract negative attention 2.Names that do not use bad language 3.Names that don’t reveal any personal information 4.Names that don’t reveal a real name, age, or gender

Password Security

Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band

Why are student accounts easily hacked? The password is cracked using a password cracking program. The password is easily guessed by others who know personal things about the student. Students write their passwords down where others are able to see it. Students give their password to friends who then decide to use it or give it to others who use it. Other students see the password as the student enters it on a keyboard.

Check Your Password

a.Does your password include the name of a family member or pet? -3 b.Does your password include a birth date of a family member? -3 c.Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? -1 d.Does your password contain a random set of numbers? +2 e.Does your password contain both letters and numbers? +2 f.Does your password have 8 or more characters? +2 g.Does your password have less than 6 characters? -1 h.Does your password contain one or more non-number, non-letter characters such as a ! Or =? +3 i.Does the password contain the date of a well known event, such as the date a baseball team won the pennant? -1 j.Does your password contain at least 3 numbers in numerical sequence such as “123”? - 2 k.Does your password contain any word spelled backwards? -1 l.Is your password written down on any piece of paper within 15 feet of your computer? -2 m.Does your password contain your telephone number, zip code, area code, or a portion of them? -2 n.Does your password include a mixture of UPPER and lower case letters? +2 o.Have you ever shared your current password with a friend? -3

Password Test Scoring EXCELLENT 8 or higher SOMEWHAT GOOD 4-7 Think about adding some other characters to your password VERY POOR Less than 4 Time to make a new password

Tips for a VERY STRONG password Always use a mix of letters and numbers Use a mix of UPPER and lower case letters Use characters that are not letters or number such as =!$# Always use a password that contains 6 letters or more Create acronyms (a word that is created by taking the first letter of a sequence of words)

Individual Project Create a secure password 1.Think of a line from a song and write it down. 2.Create an acronym from the first letter of each word in the line. 3.Change at lease one letter (not the first) to a capital letter. 4.Add a non-number, non-letter character, or a substitute a ! For an I, $ for an s, etc. 5.Add a two or three digit number.

Individual Project Create a secure password 1.Think of the name of someone you admire and write it down. 2.Create a four-letter acronym from the first two letters of their first and last name. 3.Change at least one letter (not the first) to a capital letter. 4.Add a non-number, non-letter character or substitute a ! for an I, $ for an s, etc. 5.Mix in two numbers taken from your age. Don’t put these numbers next to each other.