SlideShare une entreprise Scribd logo
1  sur  16
Username Usage and Password Security
Username Usage
Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
Good or Bad? ,[object Object]
 BellaIsabella
 DarkAngel666
 Karla-Love-1996
 SimplyMe
 gun4hiRe
 babyfaceLA
 Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
Password Security
Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event  The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band

Contenu connexe

En vedette

2011 smc sgf plan
2011 smc sgf plan2011 smc sgf plan
2011 smc sgf plan
heligonix
 
Facebook 101
Facebook 101  Facebook 101
Facebook 101
heligonix
 
2012 NHD in DE theme presentation
2012 NHD in DE theme presentation2012 NHD in DE theme presentation
2012 NHD in DE theme presentation
nhddelaware
 
Big Bear Package Details
Big Bear Package DetailsBig Bear Package Details
Big Bear Package Details
Charles_Scholz
 
Zespół ZarząDzajacy Firmą
Zespół ZarząDzajacy FirmąZespół ZarząDzajacy Firmą
Zespół ZarząDzajacy Firmą
Zacznij Biz
 

En vedette (9)

15 years of service at Psalm 23 Camp, WV- St. Marks Lutheran Church, DE
15 years of service at Psalm 23 Camp, WV- St. Marks Lutheran Church, DE15 years of service at Psalm 23 Camp, WV- St. Marks Lutheran Church, DE
15 years of service at Psalm 23 Camp, WV- St. Marks Lutheran Church, DE
 
2011 smc sgf plan
2011 smc sgf plan2011 smc sgf plan
2011 smc sgf plan
 
Facebook 101
Facebook 101  Facebook 101
Facebook 101
 
Improve Results: Integrate Your Online and Offline Presence
Improve Results: Integrate Your Online and Offline PresenceImprove Results: Integrate Your Online and Offline Presence
Improve Results: Integrate Your Online and Offline Presence
 
The Heligonic Method of Inbound Marketing Services
The Heligonic Method of Inbound Marketing ServicesThe Heligonic Method of Inbound Marketing Services
The Heligonic Method of Inbound Marketing Services
 
2012 NHD in DE theme presentation
2012 NHD in DE theme presentation2012 NHD in DE theme presentation
2012 NHD in DE theme presentation
 
Big Bear Package Details
Big Bear Package DetailsBig Bear Package Details
Big Bear Package Details
 
Zespół ZarząDzajacy Firmą
Zespół ZarząDzajacy FirmąZespół ZarząDzajacy Firmą
Zespół ZarząDzajacy Firmą
 
Twitter For Beginners
Twitter For BeginnersTwitter For Beginners
Twitter For Beginners
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Sample2

  • 1. Username Usage and Password Security
  • 3.
  • 4. Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
  • 5. Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
  • 6.
  • 13. Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
  • 14. Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
  • 16. Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band
  • 17. Why are student accounts easily hacked? The password is cracked using a password cracking program. The password is easily guessed by others who know personal things about the student. Students write their passwords down where others are able to see it. Students give their password to friends who then decide to use it or give it to others who use it. Other students see the password as the student enters it on a keyboard.
  • 19. Does your password include the name of a family member or pet? -3 Does your password include a birth date of a family member? -3 Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? -1 Does your password contain a random set of numbers? +2 Does your password contain both letters and numbers? +2 Does your password have 8 or more characters? +2 Does your password have less than 6 characters? -1 Does your password contain one or more non-number, non-letter characters such as a ! Or =? +3 Does the password contain the date of a well known event, such as the date a baseball team won the pennant? -1 Does your password contain at least 3 numbers in numerical sequence such as “123”? -2 Does your password contain any word spelled backwards? -1 Is your password written down on any piece of paper within 15 feet of your computer? -2 Does your password contain your telephone number, zip code, area code, or a portion of them? -2 Does your password include a mixture of UPPER and lower case letters? +2 Have you ever shared your current password with a friend? -3
  • 20. Password Test Scoring EXCELLENT 8 or higher SOMEWHAT GOOD 4-7 Think about adding some other characters to your password VERY POOR Less than 4 Time to make a new password
  • 21. Tips for a VERY STRONG password Always use a mix of letters and numbers Use a mix of UPPER and lower case letters Use characters that are not letters or number such as =!$# Always use a password that contains 6 letters or more Create acronyms (a word that is created by taking the first letter of a sequence of words)
  • 22. Individual Project Create a secure password Think of a line from a song and write it down. Create an acronym from the first letter of each word in the line. Change at lease one letter (not the first) to a capital letter. Add a non-number, non-letter character, or a substitute a ! For an I, $ for an s, etc. Add a two or three digit number.
  • 23. Individual Project Create a secure password Think of the name of someone you admire and write it down. Create a four-letter acronym from the first two letters of their first and last name. Change at least one letter (not the first) to a capital letter. Add a non-number, non-letter character or substitute a ! for an I, $ for an s, etc. Mix in two numbers taken from your age. Don’t put these numbers next to each other.

Notes de l'éditeur

  1. Show picture of boys – have students volunteer to come up to board and use 5 words to describe each boy.By a show of hands – Which boy do you think is more likely to be honest?Which boy do you think is more likely to be mean?Which boy do you think is more likely to be a good friend?Which boy do you think is a better students in school?Why do you think is? Based on looks?Which brings us to an important point – others judge us by how we look, dress, talk, etc. – do you feel that is a true statement? Why or why not? So, when you meet someone online – you only know their username, so the names we choose are very important – do you agree with that statement?
  2. Kids sometimes choose screen names that attract negative attention, hurtful or makes others feel uncomfortable. Choosing the wrong screen name can encourage others to treat you poorly. Explain why you think someone online might harass those with screen names such as these?
  3. Some students choose screen names that give away too much information about themselves. What can you tell about these users?If a stranger strikes up a conversation with you and states “I take karate too” would you be likely to engage in a conversation. Students have a tendency to think that since they are on the computer, the other person “cannot see them” – this is not true! – especially if that user can connect you to an email address.
  4. Have students come up to board – pick a user name that is either good or bad and explain the reasoning why – have them give specific information about what is wrong.
  5. print copies for students and have them work in groups – review names as a class
  6. Handouts – check your password