We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTerrence Sidders
Modified about 1 year ago
©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic
©2002 TechRepublic, Inc. All rights reserved. Why passwords are important They are the entry point to IT and other enterprise resources. They provide access to the VPN, servers, and the network. Misused or stolen passwords can give intruders access to your personal info.
©2002 TechRepublic, Inc. All rights reserved. Internal password theft is easy “Social engineering” is one of the easiest ways for intruders to compromise networks and other organizational systems. Others can hear you give a password to someone you trust. Someone looking over your shoulder can discover a password. Don’t keep a copy of your password in a desk drawer, on a monitor, or under a keyboard.
©2002 TechRepublic, Inc. All rights reserved. Protect your password Your password is yours alone. Don’t share it with anyone, including supervisors, personal assistants, or IT personnel. Never write down your password. You wouldn’t write your PIN number for your ATM card, would you? Do NOT: Say your password aloud. your password to a co-worker. Offer anyone hints about what your password might be.
©2002 TechRepublic, Inc. All rights reserved. Create a strong password Weak passwords are common because: They are easy for users to remember. They include personal information about the user. They consist of known words that can be found in many hacker password dictionaries. They contain number or letter sequences or letter-to-number substitutions, such as E for 3 or O for zero.
©2002 TechRepublic, Inc. All rights reserved. Create a strong password Strong passwords: Are six characters or longer. Can’t contain any part of a user’s full name or username. Don’t use any term that could easily be guessed by someone who is familiar with you. Should not include any personal information, e.g., the name of a spouse or a street address.
©2002 TechRepublic, Inc. All rights reserved. Create a strong password Strong passwords, cont.: Should not contain personal identification numbers, including those on a license plate, your telephone number, birth date, or any part of your Social Security number. Contain characters from three of the four classes of characters.
©2002 TechRepublic, Inc. All rights reserved. The four character classes are: English uppercase letters (A, B, C). English lowercase letters (a, b, c). Arabic numerals (1, 2, 3). Special characters ( !, *, $, or other punctuation symbols).
©2002 TechRepublic, Inc. All rights reserved. Examples of bad passwords Sports teams or terms: LouvlleSlgr Number sequence: *12345* Letter string: AAAAAA Mixed-case sequence: ABcdEFgh Company name: AcmeIT Keyboard sequence: QwERty or ASdFgh
©2002 TechRepublic, Inc. All rights reserved. Variations on a theme are still weak Original password: BobJones TechRepublic Tiger Login Password Modified password: BJones25 1TechRepublic1 Regit Log-in Always avoid this word or anything similar to it
©2002 TechRepublic, Inc. All rights reserved. Better passwords Original password: LouvlleSlgr AcmeIT QwERty BJones25 1TechRepublic1 New password: L*6v11E5Lgr aC&3i7 Y7#RQ^e 890NEs2% T3CH&R3pU8Lic
©2002 TechRepublic, Inc. All rights reserved. Conclusion A password is the key to your organization’s resources. A strong password can protect your personal account. Take strides to make strong passwords that are not obvious to someone familiar with you. Remember to change your password on a regular basis.
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
L kout Initiative Choosing a Strong Password Office of Information Technology.
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Presents Security Awareness Workshop Audio introduction customized with your organizations name !! Protect IT.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Don’t Click That Link and other security tips… Laura Perry Chris Huys Mike Trice.
HIPAA Security Awareness What You Need To Know. Training Overview This course will discuss the following subject areas: How this training relates to you.
1 UNIT 20 The ex-hacker. Introduction 2 A hacker is a person who attempts to gain unauthorized access to a network system. They are often young teenagers.
1 AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
Keep It Private VISD COMMON SENSE MEDIA CATEGORY: PRIVACY & SECURITY.
What Are the Functions of ATM Machines?. Withdrawals Perhaps the most common function of the modern ATM, withdrawals are usually allowed from a user's.
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Virginia Department for Aging and Rehabilitative Services.
Basics Creating an account What do you need An name for yourself. An address looks like this:
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Introduction to Protocols: Entity Authentication, Key Establishment, Integrity/Message Authentication, Confidentiality INFSCI 1075: Network Security –
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Personal Safety Unit - Level 6. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers.
1 Social / Ethics NCDesk Societal and Ethical Issues.
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Rockingham County Public Schools Internet Safety Rockingham County Public Schools.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Managing Online Activity And Social Media By: Katie P, Curt W, Katie M, and Shelbe W.
Online Privacy A Module of the CYC Course – Personal Security
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
CWSP Guide to Wireless Security Active Wireless Attacks.
Managing User, Computer and Group Accounts Lecture 5.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
© 2016 SlidePlayer.com Inc. All rights reserved.