Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

The Writing Process Communication Arts.
Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON
The Writing Process.
13: Unlucky for some? …or how to test your WLAN passwords to make sure that it’s the hacker who is “unlucky” Ian Hughes Wireless Security Consultant
Internet Security Passwords.
Passwords They can be easy but very difficult to crack.
Do you know how to keep yourself safe?
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Information guide.
XML introduction to Ahmed I. Deeb Dr. Anwar Mousa  presenter  instructor University Of Palestine-2009.
Password Management PA Turnpike Commission
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Assessment Focus (This project will assess your ability to respond creatively to briefs)
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
How can a secure password help you protect your private information? Strong Passwords Hueneme Elementary School District Digital Citizenship 4th Grade.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Textual Password How to use the Textual Authentication Model (AC)
Mr. Friedman U.S. History Get the student information sheet, syllabus, and letter from the front desk. Complete the student information sheet front and.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
Safeguarding your Identity While Online i-Safe, Inc.
“L  kout” Initiative Choosing a Strong Password.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
How & Why 1 of 8 security. 2 of 8 security – Why? 1.Your address is your online identity If it is not secure you may get s (including.
Sight Words.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
How to write a paragraph
Confidentiality, Integrity, Awareness What Does It Mean To You.
PSAT Test Format and Test Taking Tips. General Test Taking Tips Expect easy questions at the beginning of each set of sentence completion questions and.
Unit 1 Try not to translate every word. Module 1 How to learn English.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
How To Be a Star How do I write an Exciting Expository Essay? First, consider the PROMPT carefully Do not rewrite or write about quote. Do not write.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Technology Orientation Access Account Your Access Account is your access to University services such as , the Internet, WebMail, ANGEL, e-Lion,
Key words: Secure | Password | Character
How to set up an Electronic Payment to MCP
is unfortunately over…
Chapter 4: Defining Your Terms
How can we keep our information safe?
I HATE STICKY NOTES (ANNOTATING) FOR PARENTS AND STUDENTS!
Choosing a Strong Password
Cybersecurity Awareness
Setting up an online account
Choosing a Strong Password
Lesson 2: Epic Security Considerations
Cybersecurity and Economics
Methods for teaching differentiation and integration
Lesson 2: Epic Security Considerations
Paragraph Writing Easy or Difficult ? ?.
Creating Passphrases Include Examples NOT REQUIRED
Choosing a Strong Password

Company Name | Phone Number | Website | Address
Safe, secure and empowered
Keeping Our Data Secure
Presentation transcript:

Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T

Once upon a time….

The (old) Do’s & Don’ts of Passwords DO! Pick a password you can remember! Make it REALLY hard to guess. Use upper and lower characters DON’T! Write your password down ANYWHERE! Make them similar to each other. Use klingon or Elvish (Elven?)

Let’s be realistic… How many passwords do you have? Don’t forget your ATM, Insurance Phone Tree, your Bank Account Test question… How are we supposed to remember them ALL???

We know you write them down….somewhere. Underneath your keyboard? In your top desk drawer? On your monitor?(Please say it’s on the back at least!) The little notebook marked PASSWORDS? The sheet of paper folded and sticking out of the dictionary above your head?

The Dilemma: I’m supposed to remember but it’s not supposed to be a word in any language & it’s supposed to be hard to guess. If I forget it, there’s no way to recover it because I can’t write it down. My dog’s (cat’s)name isn’t a word, and has upper and lower case characters.

New, more realistic rules… Use letters, numbers, special characters (upper and lower case). If you must write them down, separate the password from the account name, and keep them somewhere secure. Similarity and composition are not the same. (brainiac23 & brainiac12 are similar; fre:sZib61 and glii:tZul72 are composed in the same way)

Risk Assessment & Reality You have to decide for yourself what level of risk you are willing to assume when choosing how to secure your passwords.

We’re always scheming… Develop password generation methods that work for you, and are easy to replicate. Number/letter substitutions, nonsense sounds Passphrases and acronyms Group by account type. (what’s good for mail, might not be sufficient for the IRA)

Exhibit A: My Father

One Password, Many Places… Insecure accounts sharing a password with sensitive data accounts. One FIVE letter word.

A new method… The Book of Psalms Chapter and Verse Preserve Case, Punctuation Annotate account w/matching chapter verse pair.

Exhibit B: My Bohemian Sister

w0rDz not words! Use nonsense sounds that are pronounceable. Build a word with all the requirements Substitute a number for a vowel Use the number combination for the vowels to identify the password.

More Ideas: Your favorite formulas? Chemical compounds? (EtOH is a little too simple) What else?

Last Writes… Establish a password generation method for yourself. Find a place to keep your passwords and keep them secure. Never reuse passwords EVER. Build a fresh one.

T he End (of passwords as we know them?)

More information and handouts are available from ITSS