SlideShare une entreprise Scribd logo
1  sur  9
Passwords – Back to Basics!
Michael McKinnon, AVG (AU/NZ) Security Advisor
mmckinnon@avg.com.au




               An Avalanche Technology Group Company
What is a Password?




What should we aim for in a password?

• Should be easy to remember

• Should be hard to guess




                                        2
World’s Top 10 Most Used Passwords

• 123456              • 12345

• 123456789           • Password123

• Password            • 1234567

• 12345678            • abc123

• 654321              • Qwerty




                                      3
Can someone guess your password?




          • Favourite Football Team?
          • Pet‟s Name?
          • Family Members?



                                       4
Rank these Password in order of Strength…


1. E56#av+Yb!

2. Password123

3. aaaaaAAAAA#####43   MOST SECURE

4. 123456

5. lucasjames




                                            5
Why? Anatomy of a good Password

• The password: aaaaaAAAAA#####43

• It is 17 characters in length

• Contains upper and lowercase letters

• Contains numbers

• Contains the „#‟ symbol

• How many combinations?

    • 72 combinations, 17 combinations long is 72^17

    • That‟s 37 thousand billion billion billion combinations!!




                                                                  6
The Golden Rules of Passwords

• Never, never, ever give your password to someone else!

• Absolute minimum of 10 characters

• Use a combination of different characters

   • upper and lowercase (a – z, A – Z)

   • at least one numeral ( 0 – 9 )

   • at least one symbol ( !@#$%^&*()_+= )

• Password length is always better than randomness

• Must be easy to remember




                                                           7
Password Separation – Neat Tricks!

• Make new passwords for different accounts you access…

• Start with your “base” password (aaaaaAAAAA#####43)

   • “Facebook” – you could take the letters “f” and “b” from Face
     Book and create a new password:
       • aaaaaAAAAA#####43fb

   • “Twitter” – you could take the letters “t” and “r” from
     Twitter and create another password:
       • aaaaaAAAAA#####43tr

• Mix it up! Be Creative! Don‟t use these examples!




                                                                     8
Thank You!


             Summary:
             1. Easy to remember
             2. Size does matter
             3. Separation is vital


             Happy Strong Password Making 



             Michael McKinnon
             AVG (AU/NZ) Security Advisor

             mmckinnon@avg.com.au




                                              9

Contenu connexe

En vedette

Management report
Management reportManagement report
Management reportRishi Jain
 
Policy vs strategic planning
Policy vs strategic planningPolicy vs strategic planning
Policy vs strategic planningMentari Pagi
 
Management presentation
Management presentationManagement presentation
Management presentationRishi Jain
 
CH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsCH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsMentari Pagi
 
Implementing strategy
Implementing strategyImplementing strategy
Implementing strategyMentari Pagi
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementMentari Pagi
 
Chapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationChapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationMentari Pagi
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of CapitalMentari Pagi
 
strategy formulation
strategy formulationstrategy formulation
strategy formulationMentari Pagi
 

En vedette (9)

Management report
Management reportManagement report
Management report
 
Policy vs strategic planning
Policy vs strategic planningPolicy vs strategic planning
Policy vs strategic planning
 
Management presentation
Management presentationManagement presentation
Management presentation
 
CH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsCH 04 - Risk & Return Basics
CH 04 - Risk & Return Basics
 
Implementing strategy
Implementing strategyImplementing strategy
Implementing strategy
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology Management
 
Chapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationChapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement Formulation
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of Capital
 
strategy formulation
strategy formulationstrategy formulation
strategy formulation
 

Dernier

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Passwords - Back to Basics!

  • 1. Passwords – Back to Basics! Michael McKinnon, AVG (AU/NZ) Security Advisor mmckinnon@avg.com.au An Avalanche Technology Group Company
  • 2. What is a Password? What should we aim for in a password? • Should be easy to remember • Should be hard to guess 2
  • 3. World’s Top 10 Most Used Passwords • 123456 • 12345 • 123456789 • Password123 • Password • 1234567 • 12345678 • abc123 • 654321 • Qwerty 3
  • 4. Can someone guess your password? • Favourite Football Team? • Pet‟s Name? • Family Members? 4
  • 5. Rank these Password in order of Strength… 1. E56#av+Yb! 2. Password123 3. aaaaaAAAAA#####43 MOST SECURE 4. 123456 5. lucasjames 5
  • 6. Why? Anatomy of a good Password • The password: aaaaaAAAAA#####43 • It is 17 characters in length • Contains upper and lowercase letters • Contains numbers • Contains the „#‟ symbol • How many combinations? • 72 combinations, 17 combinations long is 72^17 • That‟s 37 thousand billion billion billion combinations!! 6
  • 7. The Golden Rules of Passwords • Never, never, ever give your password to someone else! • Absolute minimum of 10 characters • Use a combination of different characters • upper and lowercase (a – z, A – Z) • at least one numeral ( 0 – 9 ) • at least one symbol ( !@#$%^&*()_+= ) • Password length is always better than randomness • Must be easy to remember 7
  • 8. Password Separation – Neat Tricks! • Make new passwords for different accounts you access… • Start with your “base” password (aaaaaAAAAA#####43) • “Facebook” – you could take the letters “f” and “b” from Face Book and create a new password: • aaaaaAAAAA#####43fb • “Twitter” – you could take the letters “t” and “r” from Twitter and create another password: • aaaaaAAAAA#####43tr • Mix it up! Be Creative! Don‟t use these examples! 8
  • 9. Thank You! Summary: 1. Easy to remember 2. Size does matter 3. Separation is vital Happy Strong Password Making  Michael McKinnon AVG (AU/NZ) Security Advisor mmckinnon@avg.com.au 9