The Password Game CSC 596: Computing Security By Ray Myers.

Slides:



Advertisements
Similar presentations
LOGGING ON AND SHUTTING DOWN How to do both successfully at school.
Advertisements

To get to the moodle site the first thing you want to do is to go to the Great falls Public Schools Web site. Once you arrive here, you will want to click.
Password Security How secure are your passwords ? Why do we need passwords or do we need them ? Should they be simple or complex ? When should we assign.
1 Pertemuan 8 Dissatisfied Customers Matakuliah: G0502 / English for Secretaries Tahun: 2006.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
1 BA 275 Quantitative Business Methods Statistical Inference: Confidence Interval Estimation Estimating the population mean  Margin of Error Sample Size.
Getting Started in Blackboard. You will need… A web browser, preferably Internet Explorer, version 4.0 or higher An account and the knowledge of.
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
SpeechTek West 2007 Automating Password Reset to Make Employees More Efficient Jason Groshart Director of Product Engineering Password Reset.
Utilizing PBS “Cyberchase” Math Computer Games with Struggling Math Students Michelle Brennan Education 7202T Seminar in Applied Theory and Research II.
Using the Word Search Template Copy the PowerPoint presentation to your hard drive. Open the file in Microsoft PowerPoint. Go to Slide #3 – this shows.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
A P STATISTICS LESSON 9 – 1 ( DAY 1 ) SAMPLING DISTRIBUTIONS.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
David Abarca, Instructor Del Mar College Computer Corner Passwords, Passwords Everywhere !
Password Management PA Turnpike Commission
Computer basics Lesson 4 – Programs & S.O..
 Technology  6 th Grade  Ms. Silvia Ocampo  Write your name:  Choose the correct answer for the following statements.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
INTERNET SAFETY RULES. TECHNOLOGY Technology has become an important part of today’s classroom as well as the world. Students need to be able to use and.
Do Now For a sample of 20 songs, the average song length is 3.5 minutes with a standard deviation of 0.5 minute. Construct a 90% CI for the population.
The Computer Basics. A computer is an electronic machine Computers can do anything that someone tells them to do Since computers are so fast at processing.
 Who are you?  PRINT name  Inside Name Tag, write adjectives that begin with your initials. Imag e.
Welcome to POLARIS! Is this your first Visit? Would you like for me to assist you? YES NO.
Hello! This presentation is designed to be used with your students to help them join your class and create unique usernames and passwords.
How can giving ELL students access to learning games on a computer help them learn in the classroom? By: Lisa Cruz.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
Title III Desk Monitoring Oregon Department of Education September 24,
Lucy’s Investigation. Is A the most common letter used in the English language? A O E These are the results of what 40 people think. This is the actual.
1 BA 275 Quantitative Business Methods Quiz #2 Sampling Distribution of a Statistic Statistical Inference: Confidence Interval Estimation Introduction.
Using the website (click the link above), add the needed information to this PowerPoint. Save your presentation to your files as “programs.ppt” You may.
Getting to Know You 천안공업고등학교 송 영 화 Please answer the following questions: What is one goal you’d like to accomplish in your lifetime? Who is your hero.
The Pyramid Game Entire team does the same term Yes! Reading Directly from the Text book or Notes 2 minute Rounds No telling the first letter of the word.
W ELCOME TO ESL! With Ms. Wright. C LASSROOM RULES 1. Arrive on time 2. Come prepared to learn 3. Respect yourself and others.
Unit 1 How often do you exercise? September 2nd, 2004.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
TCH010 – Unit 1 Lesson 5 Ms. Simcox. Introduction Question:  Do you find using a Windows PC difficult? Why or why not? This session will be recorded.
Technological Awareness for Teens and Young Adults.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Information Systems Desktop Support
The Effects of Intensive Sand Writing on Phonemic Awareness in Kindergarten By Coby Long.
Things To Avoid: 1-Never your password to anyone.
Intro to SurgiNet Applications Computer-Based Training
Clinical Documentation (PowerForms) For Ambulatory Staff
Computers Vocabulary.
Log in. Monitor yourself.
Intro to Clinical Documentation Basics Computer-Based Training
THE START.
SurgiNet Case Tracking Computer-Based Training
Using the Word Search Template
Game & Simulation Foundations
English Corner Magic Dragon
Review for Test1.
Numbers ~ Letters ~ Symbols
Statistically speaking
Keeping Our Data Secure
Getting to know you.
Presentation transcript:

The Password Game CSC 596: Computing Security By Ray Myers

Your Password More than one password? Assigned to you or chosen by you? Changed…  Weekly  Monthly  3 Months  Never

Your Password Known to…  Yourself only  Your roommate and/or significant other  Your boss  Your systems administrator  One other co-worker or fellow Student  Entire population of Pittsburgh

Your Password Memorized or cribbed  File on your hard drive  In a desk drawer  On your PDA  Post-it on your monitor  “Memorized” by Windows

Your Password Is Your Password:  Your name  Your significant other’s name  Your dog’s name  Your birthday  Your birthday – backwards  Your favorite singer  Any word in the English Language

Your Password If you answered YES to more than ONE of the questions above, the average “Life Expectancy” of your password is about 17 MINUTES!

Your Password Does Your Password Contain…  A random letter pattern  Both letters and numbers  Letters, numbers, and symbols IF you answered YES to one or more of the above, your password’s “Life Expectancy” just improved to about 3.4 days!