Copyright Pearson Prentice-Hall 2010 2 3 Password Length in Characters Low Complexity: Alphabetic, No Case (N=26) Alphabetic, Case-Sensitive (N=52) Alphanumeric:

Slides:



Advertisements
Similar presentations
Financial Aid Management System Account Registration and Confirmation.
Advertisements

Garfield AP Computer Science
Copyright © 2014, 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Starting Out with C++ Early Objects Eighth Edition by Tony Gaddis,
College of Information Technology & Design
Chapter 9: Searching, Sorting, and Algorithm Analysis
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 18 Indexing Structures for Files.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Click here for getting your Student User Id & password.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Distribution of Income & Income Inequality The Lorenz Curve & The Gini Index.
e-Challan payment through GRAS (Deface Challan)
9/15/09 - L15 Decoders, Multiplexers Copyright Joanne DeGroat, ECE, OSU1 Decoders and Multiplexers.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Password Management PA Turnpike Commission
MOS 101 Kamiakin High School. Identifying Curriculum Step 1:Take the Exam Step 2: Explore the Resources CCI Online Microsoft Office Courseware NC Certification.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
1 DoD Cardholder Self Registration November 21, 2008.
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,
(Down 6) 14. sunshine (Up 1) 15. master (Down 1) (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
Common Codes Download Overview Common Codes Download Overview By: Quek Shan Shan.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley. Chapter 4 Applications of the Derivative.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
(Down 6) 14. sunshine (Up 1) 15. master (Down 1) (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football.
Good strong passwords are key to keeping your access and data safe.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
PZAPR Parallel Zip Archive Password Recovery CSCI High Perf Sci Computing Univ. of Colorado Spring 2011 Neelam Agrawal Rodney Beede Yogesh Virkar.
MVS Express Electronic Filing IFTA & IRP Instructions - Initial Login Before attempting to login, please ensure that all popup.
Get on the internet and go to this site! Upper right corner, click on “create account” link in blue to the left of the login box. Look.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Mean, Median, Mode, and Range Nate Basalyga. Mean The mean is the average of your group set of numbers When finding the mean, you add up each number in.
Prepare to set up you new Gmail Account. What are you using? Software Program Name Owned bySoftware Location Outlook ExpressMicrosoftOn Your Computer.
1 Lexicographic Search:Tries All of the searching methods we have seen so far compare entire keys during the search Idea: Why not consider a key to be.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Introduction to MySQL Ullman Chapter 4. Introduction MySQL most popular open-source database application Is commonly used with PHP We will learn basics.
Security Cooperation Information Portal (SCIP) Token User Login Instructions.
SCC Student Technology Access Student Login Guide Log on a SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login Enter.
Login & Logout. What is a Login & Logout Test? A Login & Logout test will validate a user authentification process by simulating a user login-logout sequence.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Examples: Find the derivative Higher Order Derivatives 1 st Derivative: 2 nd Derivative: 3 rd Derivative: 4 th Derivative:
By Matt Norris. Physical Security - Threats -User Authentication Techniques Information Security - Threats -User Authentication Techniques Good Authentication.
Keyboarding Online Keyboard Short Course Mr. Ervin East Hardin Middle School.
Understanding Security Policies Lesson 3. Objectives.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
LastPass Password Management
Understanding Security Policies
Password Management Limit login attempts Encrypt your passwords
©2004 by Pearson Education. ©2004 by Pearson Education.
Access Controls and Authentication
©2004 by Pearson Education. ©2004 by Pearson Education.
Eeee.
Registering on the SITE is a MULTI-STEP process:
Directions for accessing the New Intesa Sanpaolo Supplier Portal
Passwords.
11.8 Length of Curves Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley.
Home Access For Students.
Home Access For Students.
Understanding Security Policies
To Create ID on e-tendering Site Click “Register”
Presentation transcript:

Copyright Pearson Prentice-Hall

3 Password Length in Characters Low Complexity: Alphabetic, No Case (N=26) Alphabetic, Case-Sensitive (N=52) Alphanumeric: Letters and Digits (N=62) High Complexity: All Keyboard Characters (N=80) ,7043,8446, ,9767,311,61614,776,33640,960, ,915,77619,770,609, ,800,235, E E E E E E E E E+19 Note: On average, an attacker will have to try half of all combinations.

Copyright Pearson Prentice-Hall

6

Use Password Manager 1Password Roboform Password Based Key Derivation Function Version 2 (PBKDFV2) Systems using PBKDFV2 Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

ItemMean Number of Sites105.7 Number of Unique IDs6.6 Number of Unique passwords4.7 Number of Unique log-in credentials11.8 ID re-use ratio19.1 Password re-use ratio29.2 Log-in credentials re-use10.5 % of used unique log-in credentials45.6%

ItemMean Inclusiveness0.94Use the same log-in credentials Largest component nd largest component (cumulative) 3 rd largest component (cumulative) Vulnerability Index most frequently used log-in combinations use in 81% of sites vs unique log-in credentials VI = expected proportion of sites subject to potential breaches if a breach at one site occurs Larger values of VI indicate higher levels of vulnerability