Presentation on theme: "Passwords are the key to network and data security."— Presentation transcript:
1 Passwords are the key to network and data security. Here are a few helpful tips for selecting, safeguarding and successfully using your password.
2 Passwords are like underwear . . . the longer the better!Use a password that is at least7 characters long.Use a mix of punctuation marks, letters and numbers.Choose letters from a phrase that is meaningful to you.
3 Passwords are like underwear . . . change yours often!CHANGE your password if:you’ve written your password down and you think it hasbeen exposed.you’ve told your passwordto anyone.you've used an insecure service such as FTP or telnet.
4 Passwords are like underwear . . . don't leave yours lying around! KEEP your password secret!Never leave your passwordin a non-secure place.Never let anyone look overyour shoulder while you typeyour password.Never use the same passwordon other systems or accounts.
5 Passwords are like underwear . . . don't share yours with friends! PROTECT your password!Don’t share your password with a support person or colleague.Don’t share your password with a family member.Don’t share your password with a roommate.
6 Passwords are like underwear . . . be mysterious!CREATE a unique password!Never use a dictionary word, even spelled backwards.Never use a foreign word.Never choose a passwordthat relates to you personally, such as your name, ID, birth date.
7 Some examples of BAD passwords: MaryJane(Not complex at all. Contains personal information.)apple234(Not complex. Contains a dictionary word.)Chipola2(Contains personal information.)PuppyDog(Contains dictionary words.)
8 Some examples of GOOD passwords: wLc2$pLd Gbg2Co*d (“washing laundry costs two dollars per load")Gbg2Co*d(“good boys go to church on Sundays")bAn4NaD0c("banana + doc")PuqP4d0g(Interchange letters for numbers or similar letters to remove the dictionary words from “puppy dog”.)
9 An insecure passwordcan put you,your co-workers,the college andour students at risk.Be aware and be secure.
10 The EndPresented By:Information SystemsManagement