13. 1234567 (Down 6) 14. sunshine (Up 1) 15. master (Down 1) 16. 123123 (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football.

Slides:



Advertisements
Similar presentations
Financial Aid Management System Account Registration and Confirmation.
Advertisements

Copyright © 2014, 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Starting Out with C++ Early Objects Eighth Edition by Tony Gaddis,
Authentication and Constructing Strong Passwords.
Data Dictionary What does “Backordered item” mean? What does “New Customer info.” contain? How does the “account receivable report” look like?
3/5/2009Computer systems1 Analyzing System Using Data Dictionaries Computer System: 1. Data Dictionary 2. Data Dictionary Categories 3. Creating Data Dictionary.
Matt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern Presented by Erik Archambault.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 18 Indexing Structures for Files.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Click here for getting your Student User Id & password.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Welcome to And the Rice University Online Job Application Tutorial.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Password Management PA Turnpike Commission
Staying Safe Online Keep your Information Secure.
File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity.
Becoming More Secure Online: Passwords & Social networking Walid Al-Saqaf For the Workshop: Secure Information Gathering, Storing, and Sharing Istanbul,
(Down 6) 14. sunshine (Up 1) 15. master (Down 1) (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
Common Codes Download Overview Common Codes Download Overview By: Quek Shan Shan.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Copyright Pearson Prentice-Hall Password Length in Characters Low Complexity: Alphabetic, No Case (N=26) Alphabetic, Case-Sensitive (N=52) Alphanumeric:
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Birmingham News Sunday October 28, 2012  password1.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Joshua Fuller. - Passwords keep your information private - Never tell your password to ANYONE - Change your password regularly Basic Security.
MVS Express Electronic Filing IFTA & IRP Instructions - Initial Login Before attempting to login, please ensure that all popup.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Get on the internet and go to this site! Upper right corner, click on “create account” link in blue to the left of the login box. Look.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
1 Lexicographic Search:Tries All of the searching methods we have seen so far compare entire keys during the search Idea: Why not consider a key to be.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
SCC Student Technology Access Student Login Guide Log on a SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login Enter.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Examples: Find the derivative Higher Order Derivatives 1 st Derivative: 2 nd Derivative: 3 rd Derivative: 4 th Derivative:
By Matt Norris. Physical Security - Threats -User Authentication Techniques Information Security - Threats -User Authentication Techniques Good Authentication.
Keyboarding Online Keyboard Short Course Mr. Ervin East Hardin Middle School.
Understanding Security Policies Lesson 3. Objectives.
David Wigley HCC Security Architect Security Trends for 2016.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Strong Passwords Get back, you hacker!. Wimpy Passwords Pet names Nicknames Things people can guess Dictionary Personal info.
September 19, 2016 Steve Konecny CFE, CIRA, CEH, CRISC Hands on Hacking.
LastPass Password Management
IT Security Awareness Day October 19, 2016
Understanding Security Policies
Class Name: Online Safety & Privacy Basics
Password Management Limit login attempts Encrypt your passwords
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Access Controls and Authentication
An Evening of Information!
Eeee.
Registering on the SITE is a MULTI-STEP process:
Directions for accessing the New Intesa Sanpaolo Supplier Portal
Passwords.
Home Access For Students.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
最容易被破解的25個密碼.
Company Name | Phone Number | Website | Address
To Create ID on e-tendering Site Click “Register”
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

(Down 6) 14. sunshine (Up 1) 15. master (Down 1) (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football (Up 5) 21. jesus (New) 22. michael (Up 2) 23. ninja (New) 24. mustang (New) 25. password1 (New) compiled from files containing millions of stolen passwords posted online by hackers.

Copyright Pearson Prentice-Hall

10 Password Length in Characters Low Complexity: Alphabetic, No Case (N=26) Alphabetic, Case-Sensitive (N=52) Alphanumeric: Letters and Digits (N=62) High Complexity: All Keyboard Characters (N=80) ,7043,8446, ,9767,311,61614,776,33640,960, ,915,77619,770,609, ,800,235, E E E E E E E E E+19 Note: On average, an attacker will have to try half of all combinations.

Copyright Pearson Prentice-Hall

ItemMean Number of Sites105.7 Number of Unique IDs6.6 Number of Unique passwords4.7 Number of Unique log-in credentials11.8 ID re-use ratio19.1 Password re-use ratio29.2 Log-in credentials re-use10.5 % of used unique log-in credentials45.6%

Reuse ratio = 2.9, hmm I wonder how accurate this is?

ItemMean Inclusiveness0.94Use the same log-in credentials Largest component nd largest component (cumulative) 3 rd largest component (cumulative) Vulnerability Index most frequently used log-in combinations use in 81% of sites vs unique log-in credentials VI = expected proportion of sites subject to potential breaches if a breach at one site occurs Larger values of VI indicate higher levels of vulnerability

Use Password Manager 1Password Roboform Password Based Key Derivation Function Version 2 (PBKDFV2) Systems using PBKDFV2 Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall