Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security and Cybercrimes

Similar presentations


Presentation on theme: "Information Security and Cybercrimes"— Presentation transcript:

1 Information Security and Cybercrimes
By Clemente Andre Inocente M.A. & B.S.A (SDSU Alumni) College of Sciences at SDSU Operating Systems Analyst & Information Technology Consultant

2 What Is The Moral of This Scene?

3 Supplement Topics To Our Textbook
John the Ripper (Mac, Unix, PC) Suggested passwords to use, but really up to the individual Secured Your Mobile Devices? (e.g. iPads, cell phones, laptops, etc…) Got Anti-Virus/Spyware? Automating System Security and monitoring (e.g. scheduled preventive maintenance)

4 John the Ripper (Mac, Unix, and Windows)
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords, although Windows LM hashes and a number of other password hash types are supported as well. John the Ripper is free and Open Source software, distributed primarily in source code form.

5 Suggested Passwords, But Up To Individual
Strong passwords and passphrases contain characters from each of the following four categories: Character category Examples Uppercase letters A, B, C Lowercase letters a, b, c Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) and spaces ` ~ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? / REF: Microsoft Windows Help- Tips for creating strong passwords and passphrases

6 Suggested Passwords, But Up To Individual (Cont…)
Don’t use names, words found in a dictionary, phone numbers, dates, or simple combinations of these. Avoid using a pattern of keyboard characters, such as diagonal lines of keyboard keys (for example, njimko). Use a sequence of random characters. Include a mix of upper- and lowercase letters, numbers, punctuation marks, and (if the site or item allows it) characters typed while holding down the Option key. While defining a password, use the Password Assistant to see how secure your password is. To open the Password Assistant, click the Key button next to the Password field or the New Password field. Start with a phrase, verse, or line from a song. Omit some letters, and transform others into numbers or punctuation marks that resemble the original character. You might want to insert additional punctuation and numbers too. (Cont….) REF: OS X Mountain Lion-Tips for creating secure passwords

7 Secure Your Mobile Devices? (e.g. iPads, cell phones, laptops, etc…)
Password protected/swiping/Face-to-Unlock. Delete: unused apps., saved passwords & user names System updates/PRL (mobile phones)

8 Got Antivirus, SDSU Students do
REF:

9 Systemizing Security Through Automation and Monitoring (e. g
Systemizing Security Through Automation and Monitoring (e.g. scheduled preventive maintenance) OS & Software Automatic Updates (scheduled) Manually check updates, just like your car. Got Plug-ins/ Add ons? Check out my site: sci.sdsu.edu/andre-inocente/mmtest.htm

10 Security Through Automation and Monitoring (e. g
Security Through Automation and Monitoring (e.g. scheduled preventive maintenance) (Cont…)


Download ppt "Information Security and Cybercrimes"

Similar presentations


Ads by Google