We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTerrence Sidders
Modified about 1 year ago
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Why passwords are important They are the entry point to IT and other enterprise resources. They provide access to the VPN, e-mail servers, and the network. Misused or stolen passwords can give intruders access to your personal info.
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Internal password theft is easy “Social engineering” is one of the easiest ways for intruders to compromise networks and other organizational systems. Others can hear you give a password to someone you trust. Someone looking over your shoulder can discover a password. Don’t keep a copy of your password in a desk drawer, on a monitor, or under a keyboard.
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Protect your password Your password is yours alone. Don’t share it with anyone, including supervisors, personal assistants, or IT personnel. Never write down your password. You wouldn’t write your PIN number for your ATM card, would you? Do NOT: Say your password aloud. E-mail your password to a co-worker. Offer anyone hints about what your password might be.
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Create a strong password Weak passwords are common because: They are easy for users to remember. They include personal information about the user. They consist of known words that can be found in many hacker password dictionaries. They contain number or letter sequences or letter-to-number substitutions, such as E for 3 or O for zero.
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Create a strong password Strong passwords: Are six characters or longer. Can’t contain any part of a user’s full name or username. Don’t use any term that could easily be guessed by someone who is familiar with you. Should not include any personal information, e.g., the name of a spouse or a street address.
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Create a strong password Strong passwords, cont.: Should not contain personal identification numbers, including those on a license plate, your telephone number, birth date, or any part of your Social Security number. Contain characters from three of the four classes of characters.
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. The four character classes are: English uppercase letters (A, B, C). English lowercase letters (a, b, c). Arabic numerals (1, 2, 3). Special characters ( !, *, $, or other punctuation symbols).
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Examples of bad passwords Sports teams or terms: LouvlleSlgr Number sequence: *12345* Letter string: AAAAAA Mixed-case sequence: ABcdEFgh Company name: AcmeIT Keyboard sequence: QwERty or ASdFgh
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Variations on a theme are still weak Original password: BobJones TechRepublic Tiger Login Password Modified password: BJones25 1TechRepublic1 Regit Log-in Always avoid this word or anything similar to it
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Better passwords Original password: LouvlleSlgr AcmeIT QwERty BJones25 1TechRepublic1 New password: L*6v11E5Lgr aC&3i7 Y7#RQ^e 890NEs2% T3CH&R3pU8Lic
©2002 TechRepublic, Inc. www.techrepublic.com. All rights reserved. Conclusion A password is the key to your organization’s resources. A strong password can protect your personal account. Take strides to make strong passwords that are not obvious to someone familiar with you. Remember to change your password on a regular basis.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
“L kout” Initiative Choosing a Strong Password.
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
L kout Initiative Choosing a Strong Password Office of Information Technology.
Cyber Safety Jamie Salazar. Cyber Safety Concerns Computer Safety – how to protect your computer against hackers, viruses, spam, and bugs. Identity Theft.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
How can a secure password help you protect your private information? Digital Citizenship Unit 2 Lesson 1: Strong Passwords.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Subtitle Version or Date Presentation TitleIntroduction to using BCeSIS Module 2.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords Two main requirements for choosing a secure password: 1) MUST be easy.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
How To Protect Your Privacy and Avoid Identity Theft Online.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
INTERNET SAFETY FOR KIDS. PASSWORDS : FIRST STEP TO SAFETY.
Today’s Objective: I will create a strong, private password.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Robert Crawford, MBA West Middle School. Describe ways criminals obtain passwords Discuss ways to protect your computer from being accessed by others.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Security Planning and Administrative Delegation Lesson 6.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Password Management PA Turnpike Commission. Creating Strong Passwords Passwords must be: At least 8 characters in length. A mix of letters (uppercase.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Security A major concern related to the design of web applications Many sites contain a huge quantity of personal and financial information. Web sites.
Secure Computing Series Computer Password Safety.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SCC Student Technology Access Student Login Guide SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login User name – this.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
Internet Security Passwords What Are Passwords? September 2008: Hacker steals password, breaks into Vice-Presidential candidate Sarah Palin’s account.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
By Kyle Bickel. Securing a host computer is making sure that your computer is secure when it’s connected to the internet This be done by several protective.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Hacking for Beginners Become a hacker by taking four easy steps.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
© 2017 SlidePlayer.com Inc. All rights reserved.