Robert Crawford, MBA West Middle School
Describe ways criminals obtain passwords Discuss ways to protect your computer from being accessed by others Explain the criteria of a strong password Summarize ways to stay safe online Essential Question To be Discussed
◦ Packet sniffer Not in Text ◦ Proxy server ◦ Social Engineering
In many cases, to attack a network, the attacker will use a password. ◦ There are several ways that the password can be obtained. ◦ Last week we talked about password scanning. ◦ There are other ways to obtain passwords
In many cases, to attack a network, the attacker will use a password. ◦ Guessing ◦ Finding ◦ Sniffing
A packet sniffer is a program that examines data streams on networks.
In many cases, to attack a network, the attacker will use a password. ◦ Guessing ◦ Finding ◦ Sniffing ◦ Pretending Also known as “Social Engineering” ◦ Modifying Superuser Admin etc/shadow
Use strong passwords ◦ Do not use! Family names Nicknames Birthdates ◦ Instead, use a combination of at least six: Uppercase characters Lowercase characters Numbers Symbols
Use strong passwords ◦ And practice good password security. When registering at a website, be sure to follow the advise for making a “strong” password. Change your password on a regular basis Do not record your password on paper near your computer. Never share your password Be careful when entering your password
Use strong passwords Browse Anonymously ◦ We have already discussed how websites track you as a user. ◦ Anonymizer (not accessible from school network) Other proxy servers a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
Use strong passwords Browse Anonymously Use different addresses Avoid site registration
You can avoid most computer crime: ◦ Understand your browsers security settings ◦ Don’t open attachments unless it is from someone you know and seems like something they would send When in doubt, verify before opening ◦ Deal only with reputable companies When in doubt, Google the company ◦ Never share personal or financial information Safe Social Networking
Describe ways criminals obtain passwords Discuss ways to protect your computer form being accessed by others Explain the criteria of a strong password Summarize ways to stay safe online Essential Question What do you think it should be? Discuss... Words and terms Packet sniffer Not in Text Proxy server Social Engineering