MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
Computer Fraud, Identity Theft, and Computer Forensics How not to be a victim Presented by Scott R. Ellis Manager, Forensic and Litigation Technologies.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Centre for Materials Physics Presentation by Peter Byrne Creating and using Strong Passwords Superconductivity Group.
Time Management. Goal Get as much done, remember as much as possible in as LITTLE time as possible!!! WORK SMARTER, NOT HARDER Key word: EFFICIENCY.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Threats to I.T Internet security By Cameron Mundy.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
8/1/2015. Please Ask Questions! 2 Hacks In The News Office of Personnel Management (OPN) Flash vulnerabilities Sony Heartbleed iCloud Leaked Pictures.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Mrs. Dennis South Media Specialist Mrs. Bakanas North & South Media Specialist Mrs. Martinez North Media Specialist Mrs. Kelley Media Assistant Miss VanArtsdalen.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
CIS 450 – Network Security Chapter 8 – Password Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Password Security Everything (well… a lot, anyway) you didn’t know, or want to, but really actually need to.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
To Introduction cyber safety Grids for Kids – January 2008 Written by Donna Cobrin.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Fraud Protection.
Fraud protection.
Common Methods Used to Commit Computer Crimes
Password Management Limit login attempts Encrypt your passwords
Technology for Tomorrow
Lesson 2- Protecting Yourself Online
Robert Leonard Information Security Manager Hamilton
Lesson 2- Protecting Yourself Online
Safe, secure and empowered
Presentation transcript:

MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE)

BUT PASSWORD MANAGEMENT IS HARD

WHY CAN’T WE USE EASY PASSWORDS?

THIS IS A GRAPHICS CARD It’s cheap and good at playing video games. About every teenager has access to one. It’s also very good at hacking your password.

“A $1000 computer can process 3.3 billion passwords per second… a professional can make thousands of dollars a day selling your information on the black market.” (PCPro.com)

Dictionary Attacks: “GoBuffs!” a couple minutes a couple hours Brute Force: “fjR8n” in 24 seconds “%fjR8nQNUc5GPj9” would take over ten years *Extra credit: 15 characters or more forces windows to store passwords differently – which breaks certain attacks. IT’S JUST A MATTER OF TIME

HACKING IS BIG BUSINESS 2011 = 12.5 billion in reported losses Some estimates put that number closer to 10 times as much.

HOW DO HACKERS GET YOUR PASSWORD? Physical access to your office or computer Social Engineering/Phishing (asking nicely) Hacking commonly used sites Malware Infections Network based attacks

LOSING YOUR PASSWORDS SINCE 1978

“SECURING YOUR PASSWORD DOESN’T MEAN USING TAPE”

Under Keyboard In a Rolodex Top desk drawer Under desk calendar In the planter Wallet/Purse/Gym Bag

NOW THAT YOU KNOW WHERE PEOPLE HIDE THEIR PASSWORDS

DON’T DO IT

SURE, LONG PASSWORDS ARE SECURE BUT I CAN’T REMEMBER THEM….

MAKING MEMORABLE PASSWORD REQUIRES THOUGHT

ABBREVIATE I like taking the bus, but I ended up 20 minutes late! Becomes: Ilttb,bIeu20ml! (15 characters)

LETTER SUBSTITUTION Create a long word or phrase: I Like To Eat Tacos Remove spaces: ILikeToEatTacos Replace letters with symbols:

A FEW SUBSTITUTION SUGGESTIONS LetterBecomes E3 S$ I! O0 K|< C(

Take two words: Bot & Kneecap Scramble a few letters: Bocat_&_Kneep Add Complexity: 54 Bocat_&_Kne54ep WORD JUMBLE

KEYBOARD PATTERNS Use the Shift Key to Add Complexity Becomes: 5^YghjkmnbVCX Use with caution, easy ones are in dictionary attacks!

OK, SO I’VE GOT A GREAT PASSWORD, I’LL JUST KEEP USING THAT ONE RIGHT?

REUSED PASSWORDS ARE DANGEROUS

LINKEDIN LOST 6.4 MILLION USERS PASSWORDS Hackers can use those passwords to commit identity fraud including: Hack into corporate accounts Break into bank accounts Spam accounts Gather more info for offline use (Credit Cards) LinkedIn is now facing $5 million class action lawsuit due to the loss.

PRO TIP: MAKING PASSWORDS UNIQUE TO EACH SITE Have a secure base password: 5^YghjkbVCX Select two letters from the site or program: usbank.com (2nd & 4th in this case) Add those letters to your password: 5^YghjsakbVCX

WAIT A MINUTE… THIS SITE WANT’S ME TO CHANGE IT NOW… Todays Date: 1/11/13 Pick a couple characters of the date: 11 Shift the numbers (+3 in this case): 44 Add those numbers to your password 5^Yghjsak becomes 5^Yghjsak44 Write down when you last change the password

INSTANT, UNIQUE AND SECURE PASSWORDS FOR ALL USES

A FEW TOOLS TO HELP…

PASSWORD GENERATORS Many free ones, but be careful! We suggest changing the results before using them. es/password/

PASSWORD MANAGERS

TWO FACTOR AUTHENTICATION

QUESTIONS? Joe Kuster IT Projects Manager

IDENTIKEY Your “username” is the Identikey assigned to you by the University. Keep private Commit to memory Do not use Username or Password for any other purpose!

HR IDENTIKEY REQUIREMENTS 15 characters or longer Avoid repeating characters No words that can be found in a dictionary (in any language) Not be easily guessable (e.g., your birthday, age, anniversary…) All four character sets: capital, lowercase, numerical and symbol (e.g., A,a,1,!)