Www.durham.ac.uk/cmp Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

 The Internet can be great- but we need to be careful about how we use it  There are lots of social media sites and some of them are not safe.  You.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Security & Encryption Thomas Fenske & Joseph Minter.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
1 1 User Manual for Approver Approving Orders on the SKF Giftzone.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
Tom Parker Project Manager Identity Management Team IT Security Group.
Information Security and Cybercrimes
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Online Job Applications. Course Outline Review resources & information needed to complete an online application Practice filling out a job application.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
David Abarca, Instructor Del Mar College Computer Corner Passwords, Passwords Everywhere !
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,
Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Good strong passwords are key to keeping your access and data safe.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Understanding Security Policies Lesson 3. Objectives.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Gmail customer service, A 3 rd party firm working to tackle and resolve technical issue faced by Gmail account users. In today’s post experts presenting.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
InformatiOn Technology Services
Understanding Security Policies
Introduction to Web Safety
Password strength Dr. X.
Investigation of Instructions for Password Generation
Cybersecurity Awareness
Start at our website at In the upper right hand corner is a link for “Office 365”
Introduction to Computers
Room Booking System User Manual.
Keep It Safe! Secure Your Secrets
Security.
Understanding Security Policies
Presentation transcript:

Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group

Centre for Materials Physics 2 Why are strong passwords important? Often people have a mentality of “it won’t happen to me.” But often users are only used as a way into the system In the incident here at Durham, a user whose account had a weak password was broken into by brute force. The hacker then used this account to get administrator access on both the supercomputing cluster and the university linux machines which all had to be shut down for 2 weeks. This inconvenienced both the user who had the weak password and all the other users of the system. Any system is only as strong as its weakest link!

Centre for Materials Physics 3 What makes a good password? Length Should be at least 8 characters, the more the better. Not a dictionary word Password guessing attempts often try words from a dictionary. There are only a few hundred thousand words in English. Using one of these will massively increases the speed at which your password can be guessed. Avoid common misspellings and sequences of numbers Use lowercase, uppercase, numeric characters and symbols Vastly increases the complexity of finding it by brute force. The strongest passwords are random combinations of letters and numbers and symbols.

Centre for Materials Physics 4 Remembering a long password Long passwords can be difficult to remember especially if they follow all these rules. Microsoft suggest: Find a sentence or two that would be memorable to you “My dog is called Frank. He is a labrador.” Use the first letter from each word mdicfhial Replace or insert numbers and capitalize some letters, for example capitalizing every 3 rd letter. mdIcf5HiaL For a very strong password, some symbols should also be added. md,Icf5Hial

Centre for Materials Physics 5 Using passwords online In theory – different password for every website E.g. and Online Shopping In practice – Most people tend to use the same password for most things they do online. Dangerous if one site is compromised or malicious. There are tricks/tools that can help with this situation. PwdHash Addon for firefox that will generate a per site password from your original password. Simple per website password Inserting two letters from the site into to your password Mypassword for facebook would become Mypassfbword Best if you use your own algorithm

Centre for Materials Physics 6 Conclusion Remembering long passwords can be a pain! Hopefully these tips will help you create and remember a strong password. Using the same password for multiple things is quite dangerous if it is compromised. Many tools and guides out there to help you generate per website passwords.

Centre for Materials Physics Presentation by Thank You Peter Byrne Superconductivity Group