25/10/20151. Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
Internet Security Passwords.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
Passwords by The UTHSC Information Security Team.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Password Management PA Turnpike Commission
ESCCO Data Security Training David Dixon September 2014.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Protecting Your Personal Information November 15, 2013.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Information Security. Survey Results Question What do you think Information Security is?
SCC Student Technology Access Student Login Guide SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login User name – this.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
“L  kout” Initiative Choosing a Strong Password.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Username Usage and Password Security. Username Usage.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Technological Awareness for Teens and Young Adults.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
LastPass Password Management
Ways to protect yourself against hackers
Choosing a Strong Password
Passwords.
IT Security awareness Training.
Introduction to Computers
Choosing a Strong Password
Lesson 2: Epic Security Considerations
The Unix Environment for Programming (Comp433)
Protecting Your Password
start to finish – November 20181
Choosing a Strong Password
Keeping Our Data Secure
INDUCTION & ORIENTATION to il&fs Technologies ltd
Presentation transcript:

25/10/20151

Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook and Yahoo passwords dumped online BBC News, 4 December 2013 Racing Post Breached: Users' Passwords Stolen Infosecurity Magazine, 25 November 2013 Did your Adobe password leak? Now you and 150m others can check The Guardian, 7 November 2013

How are passwords stolen? Password crackingPhishingMalware VIRUS

Password mistakes Pet’s name Significant dates Child’s name Favourite football team Partner’s name Place of birth Username Password password Qwerty Photoshop John Smith

Don’t make it easy! Names, dictionary words or acronyms in any language A word with a number after it (e.g. password1) Logical number replacements for letters in a word (e.g. pa55w0rd) Keyboard patterns (e.g. qwertyuiop or poiuytrewq) Sequential numbers (e.g or ) Your username Words that could be guessed easily by researching your life

Embed Animation

How to create a strong password 1 Use at least eight characters, preferably more 2 Use UPPER CASE and lower case letters 3 Use letters, numbers and special characters 4 Make it look like a random configuration 5 Use a passphrase

How to create a passphrase Take the initial letters 2 Substitute some of the letters for logical numbers 3 Add logical special characters I E C 4 L £ F 4 Vary the letter case I e c 4 L £ f 5 “I Eat Fish And Chips For Lunch Every Friday” 1 Think of a phrase IEFACFLEF I E F A C 4 L E F £ e c f

How to protect your passwords Never share your password Never reuse old passwords Never use the same password for different systems or devices Never allow websites to remember your password Change default passwords immediately Passwords can only be stored in an encrypted file Change your password every 90 days Passwords are classified Strictly Confidential

Mobile device passwords and PINs Make it appear random Never use sequences (e.g. 1234, 9876, etc.) Never use sequential numbers (e.g. 0000, 9999, etc.) Passwords and PINs must be at least four characters long

Compromised password? Contact the IT Helpdesk immediately Change your password immediately Use Password Manager to protect your passwords

To take away... Your passwords are extremely valuable Create strong passwords Never share your password Passwords can only be stored in an encrypted format Never use the same password for different systems or devices Report compromised passwords to the IT Helpdesk immediately

Thank you!