SlideShare une entreprise Scribd logo
1  sur  34
presents:
                          Passwords

       Information quoted directly and paraphrased from
     “Security Awareness” from the University of Texas at
           Austin’s Information Technology Services
       http://www.utexas.edu/its/secure/articles/keep_safe_with_strong_passwords.php
To protect your computer, your data and
     your online accounts, make a strong
     password your first line of defense.
Flickr CC Photo by Bruno Santos: http://www.flickr.com/photos/bsantos/50283672
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1750378617


                                                                                     Most people
Info from University of Texas at Austin’s Information Technology Services




                                                                                     know that
                                                                                     strong
                                                                                     passwords
                                                                                     are a good
                                                                                     idea, but don’t
                                                                                     realize
                                                                                     hackers are
                                                                                     becoming
                                                                                     increasingly
                                                                                     sophisticated
                                                                                     at password
                                                                                     “cracking.”
Flickr CC Photo by Pieter Ouwerkerk: http://www.flickr.com/photos/pieterouwerkerk/699483014
Info from University of Texas at Austin’s Information Technology Services



                                                                                              You have to
                                                                                              change your
                                                                                              password
                                                                                              frequently, and
                                                                                              stay aware of
                                                                                              what techniques
                                                                                              hackers are
                                                                                              using to steal
                                                                                              passwords, if
                                                                                              you want to stay
                                                                                              ahead of the bad
                                                                                              guys.
Internet security is based on a “weakest link”
     principle, and passwords are often the only
     thing standing between a hacker and access to
     your computer or a campus network.




Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338
Info from University of Texas at Austin’s Information Technology Services
If your password is weak, you make it easier for
    someone to break in.




Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338
Info from University of Texas at Austin’s Information Technology Services
Hackers make their livelihood
                      by automating ways to
                      continually search out the
                      weakest link to gain access to a
                      network or computer.




               Don’t let your password be the
                weak link!
Flickr CC Photo by Treyvor Leyenhorst: http://www.flickr.com/photos/10213764@N02/1485773850Info from
University of Texas at Austin’s Information Technology Services
There are real consequences to not having a
                  strong password.

                  If someone steals your password, they may find
                  a way to access your e-mail or IM messages,
                  your bank accounts, your research, your contact
                  lists and whatever else you have on your
                  computer.
Flickr CC Photo by Angel Arcones: http://www.flickr.com/photos/freddy-click-boy/3303542092
Info from University of Texas at Austin’s Information Technology Services
Your files may be altered or destroyed.
                   Sometimes hackers even take over a
                   computer and turn it into a zombie,
                   using it to perform malicious tasks such
                   as sending out large amounts of spam.

Flickr CC Photo by Thomas Hawk: http://www.flickr.com/photos/thomashawk/362270357
Info from University of Texas at Austin’s Information Technology Services
How Passwords Are Stolen
When you are creating a strong
password, it can help to know the
tactics hackers use to steal them.

The following are some of the most
frequently used techniques:
Flickr CC Photo by Eric Schmuttenmaer: http://www.flickr.com/photos/akeg/2175038829
Info from University of Texas at Austin’s Information Technology Services




                                                                        Guessing
               Programs designed to guess a user’s password are
               common. They often use personal information found
               online—such as names, birth dates, names of friends or
               significant others, pet names or license plate numbers—
               as a starting point.

             These programs can even search for a word spelled
             backwards.




                                                                              STOLEN
                                                                                      ?
TIP: It’s best to
                                                                                    steer clear of any
                                                                                    personally
                                                                                    identifying
                                                                                    information when
                                                                                    creating a
                                                                                    password.


Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by David Glover: http://www.flickr.com/photos/davidglover/4269594949
Info from University of Texas at Austin’s Information Technology Services




                               Dictionary-based attacks
                      Programs and software also exist that
                      run every word in a dictionary or word
                      list against a user name in hopes of
                      finding a perfect match.
TIP: Staying away
                                                                                    from actual words,
                                                                                    even in a foreign
                                                                                    language, is
                                                                                    recommended.



Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
“Brute Force” attacks
                                                                                       By trying every
                                                                                      conceivable combination
                                                                                      of key strokes in tandem
                                                                                      with a user name, brute
                                                                                      force attacks often
                                                                                      discover the correct
                                                                                      password.

                                                                                      Programs can execute a
                                                                                      brute force attack very
                                                                                      quickly.
Flickr CC Photo by Alex Eylar: http://www.flickr.com/photos/hoyvinmayvin/4687336568
Info from University of Texas at Austin’s Information Technology Services
TIP: The best way
                                                                                    to beat such an
                                                                                    attack is with a
                                                                                    long, complex
                                                                                    password that
                                                                                    uses upper and
                                                                                    lower case letters,
                                                                                    numbers, special
                                                                                    characters and
                                                                                    punctuation
                                                                                    marks.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
Phishing

               Phishing scams usually try to hook you with
               an urgent IM or e-mail message designed to
               alarm or excite you into responding.

               These messages often appear to be from a
               friend, bank or other legitimate source
               directing you to phony Web sites designed to
               trick you into providing personal information,
               such as your user name and password.
Flickr CC Photo by Widjaya Ivan: http://www.flickr.com/photos/28288673@N07/6457165789
Info from University of Texas at Austin’s Information Technology Services
TIP: Don’t click a
                                                                                    link in any
                                                                                    suspicious e-
                                                                                    mails, and don’t
                                                                                    provide your
                                                                                    information
                                                                                    unless you trust
                                                                                    the source.


Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
“Shoulder surfing”

                 Passwords are not always
                 stolen online. A hacker
                 who is lurking around in a
                 computer lab, cybercafé
                 or library may be there for
                 the express purpose of
                 watching you enter your
                 user name and password
                 into a computer.
Flickr CC Photo by tanakawho: http://www.flickr.com/photos/28481088@N00/425099204
Info from University of Texas at Austin’s Information Technology Services
TIP: Try to enter
                                                                                    your passwords
                                                                                    quickly, without
                                                                                    looking at the
                                                                                    keyboard, as a
                                                                                    defense against
                                                                                    this type of theft.



Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
Tips for Creating and Using
                           Safe Passwords




Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/688068169
Info from University of Texas at Austin’s Information Technology Services
Use BOTH
                                                                                              upper- and
                                                                                              lower-case
                                                                                              letters.




Flickr CC Photo by Nina Stössinger: http://www.flickr.com/photos/ninastoessinger/4179518104
Info from University of Texas at Austin’s Information Technology Services
Place numbers and punctuation marks
                        randomly in your password.




Flickr CC Photo by Lali Masriera: http://www.flickr.com/photos/visualpanic/856235055
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by Jason Pearce: http://www.flickr.com/photos/jasonpearce/4750110576
Info from University of Texas at Austin’s Information Technology Services




                      Make your password long and complex,
                      so it is hard to crack. Between 8 to 20
                      characters long is recommended.
Use one or more of these special
                  characters:
                   !@#$%*()-+=,<>::“‘




Info from University of Texas at Austin’s Information Technology Services
To help you easily remember your
                      password, consider using a phrase or a
                      song title as a password. For example,
                      “Somewhere Over the Rainbow”
                      becomes “Sw0tR8nBO” or “Smells Like
                      Teen Spirit” becomes “sMll10nspT.”




Flickr CC Photo by marc falardeau: http://www.flickr.com/photos/49889874@N05/6101434856
Info from University of Texas at Austin’s Information Technology Services
Make your password easy to type
                    quickly. This will make it harder for
                    someone looking over your shoulder to
                    steal it.




Flickr CC Photo by Chris Metcalf: http://www.flickr.com/photos/laffy4k/441037582
Info from University of Texas at Austin’s Information Technology Services
Using your password safely
                                                                                     Create different
                                                                                     passwords for
                                                                                     different
                                                                                     accounts and
                                                                                     applications.
                                                                                     That way, if one
                                                                                     account is
                                                                                     breached, your
                                                                                     other accounts
                                                                                     won’t be put at
                                                                                     risk too.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1454251440
Info from University of Texas at Austin’s Information Technology Services
Change your
            passwords
            regularly, about
            once every six
            months.

            (Daylight
            Savings Time?)


Flickr CC Photo by Eliazar Parra Cardenas: http://www.flickr.com/photos/eliazar/407591133
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by Mike Fernwood: http://www.flickr.com/photos/ultimateslug/326930489
Info from University of Texas at Austin’s Information Technology Services




                      Don’t share your password with
                      anyone else. Once it’s out of your
                      control, so is your security.
Never enable the “Save Password”
                 option, even if prompted to do so.

                 Pre-saved passwords make it easy for
                 anyone else using your computer to
                 access your accounts.

http://www.rhsmith.umd.edu/portal/portal_help.html
Info from University of Texas at Austin’s Information Technology Services
Be especially
               careful about
               saving
               passwords in
               web browsers.




http://www.webdevelopersnotes.com/how-do-i/clear-
browsing-data-google-chrome.php
Never walk away from
                                                                                a shared computer
                                                                                without logging off.
                                                                                This will ensure no
                                                                                other users can
                                                                                access your accounts.



Flickr CC Photo by Totumweb: http://www.flickr.com/photos/totumweb/5601416590
Info from University of Texas at Austin’s Information Technology Services
Don’t use sample passwords given on
                  different Web sites, including this one.




                               “Somewhere Over the Rainbow”
                               becomes “Sw0tR8nBO” or
                               “Smells Like Teen Spirit” becomes
                               “sMll10nspT.”



Info from University of Texas at Austin’s Information Technology Services

Contenu connexe

Similaire à Passwords and Digital Safety

Similaire à Passwords and Digital Safety (15)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 

Plus de sraslim

Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)sraslim
 
Sonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer PresentationSonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer Presentationsraslim
 
Setting privacy controls on social networks
Setting privacy controls on social networksSetting privacy controls on social networks
Setting privacy controls on social networkssraslim
 
Inspiring Students
Inspiring StudentsInspiring Students
Inspiring Studentssraslim
 
Livebinders Guide
Livebinders GuideLivebinders Guide
Livebinders Guidesraslim
 
Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7sraslim
 

Plus de sraslim (6)

Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
 
Sonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer PresentationSonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer Presentation
 
Setting privacy controls on social networks
Setting privacy controls on social networksSetting privacy controls on social networks
Setting privacy controls on social networks
 
Inspiring Students
Inspiring StudentsInspiring Students
Inspiring Students
 
Livebinders Guide
Livebinders GuideLivebinders Guide
Livebinders Guide
 
Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7
 

Dernier

4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Dernier (20)

4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Passwords and Digital Safety

  • 1. presents: Passwords Information quoted directly and paraphrased from “Security Awareness” from the University of Texas at Austin’s Information Technology Services http://www.utexas.edu/its/secure/articles/keep_safe_with_strong_passwords.php
  • 2. To protect your computer, your data and your online accounts, make a strong password your first line of defense. Flickr CC Photo by Bruno Santos: http://www.flickr.com/photos/bsantos/50283672 Info from University of Texas at Austin’s Information Technology Services
  • 3. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1750378617 Most people Info from University of Texas at Austin’s Information Technology Services know that strong passwords are a good idea, but don’t realize hackers are becoming increasingly sophisticated at password “cracking.”
  • 4. Flickr CC Photo by Pieter Ouwerkerk: http://www.flickr.com/photos/pieterouwerkerk/699483014 Info from University of Texas at Austin’s Information Technology Services You have to change your password frequently, and stay aware of what techniques hackers are using to steal passwords, if you want to stay ahead of the bad guys.
  • 5. Internet security is based on a “weakest link” principle, and passwords are often the only thing standing between a hacker and access to your computer or a campus network. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338 Info from University of Texas at Austin’s Information Technology Services
  • 6. If your password is weak, you make it easier for someone to break in. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338 Info from University of Texas at Austin’s Information Technology Services
  • 7. Hackers make their livelihood by automating ways to continually search out the weakest link to gain access to a network or computer. Don’t let your password be the weak link! Flickr CC Photo by Treyvor Leyenhorst: http://www.flickr.com/photos/10213764@N02/1485773850Info from University of Texas at Austin’s Information Technology Services
  • 8. There are real consequences to not having a strong password. If someone steals your password, they may find a way to access your e-mail or IM messages, your bank accounts, your research, your contact lists and whatever else you have on your computer. Flickr CC Photo by Angel Arcones: http://www.flickr.com/photos/freddy-click-boy/3303542092 Info from University of Texas at Austin’s Information Technology Services
  • 9. Your files may be altered or destroyed. Sometimes hackers even take over a computer and turn it into a zombie, using it to perform malicious tasks such as sending out large amounts of spam. Flickr CC Photo by Thomas Hawk: http://www.flickr.com/photos/thomashawk/362270357 Info from University of Texas at Austin’s Information Technology Services
  • 10. How Passwords Are Stolen When you are creating a strong password, it can help to know the tactics hackers use to steal them. The following are some of the most frequently used techniques:
  • 11. Flickr CC Photo by Eric Schmuttenmaer: http://www.flickr.com/photos/akeg/2175038829 Info from University of Texas at Austin’s Information Technology Services Guessing Programs designed to guess a user’s password are common. They often use personal information found online—such as names, birth dates, names of friends or significant others, pet names or license plate numbers— as a starting point. These programs can even search for a word spelled backwards. STOLEN ?
  • 12. TIP: It’s best to steer clear of any personally identifying information when creating a password. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 13. Flickr CC Photo by David Glover: http://www.flickr.com/photos/davidglover/4269594949 Info from University of Texas at Austin’s Information Technology Services Dictionary-based attacks Programs and software also exist that run every word in a dictionary or word list against a user name in hopes of finding a perfect match.
  • 14. TIP: Staying away from actual words, even in a foreign language, is recommended. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 15. “Brute Force” attacks By trying every conceivable combination of key strokes in tandem with a user name, brute force attacks often discover the correct password. Programs can execute a brute force attack very quickly. Flickr CC Photo by Alex Eylar: http://www.flickr.com/photos/hoyvinmayvin/4687336568 Info from University of Texas at Austin’s Information Technology Services
  • 16. TIP: The best way to beat such an attack is with a long, complex password that uses upper and lower case letters, numbers, special characters and punctuation marks. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 17. Phishing Phishing scams usually try to hook you with an urgent IM or e-mail message designed to alarm or excite you into responding. These messages often appear to be from a friend, bank or other legitimate source directing you to phony Web sites designed to trick you into providing personal information, such as your user name and password. Flickr CC Photo by Widjaya Ivan: http://www.flickr.com/photos/28288673@N07/6457165789 Info from University of Texas at Austin’s Information Technology Services
  • 18. TIP: Don’t click a link in any suspicious e- mails, and don’t provide your information unless you trust the source. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 19. “Shoulder surfing” Passwords are not always stolen online. A hacker who is lurking around in a computer lab, cybercafé or library may be there for the express purpose of watching you enter your user name and password into a computer. Flickr CC Photo by tanakawho: http://www.flickr.com/photos/28481088@N00/425099204 Info from University of Texas at Austin’s Information Technology Services
  • 20. TIP: Try to enter your passwords quickly, without looking at the keyboard, as a defense against this type of theft. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 21. Tips for Creating and Using Safe Passwords Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/688068169 Info from University of Texas at Austin’s Information Technology Services
  • 22. Use BOTH upper- and lower-case letters. Flickr CC Photo by Nina Stössinger: http://www.flickr.com/photos/ninastoessinger/4179518104 Info from University of Texas at Austin’s Information Technology Services
  • 23. Place numbers and punctuation marks randomly in your password. Flickr CC Photo by Lali Masriera: http://www.flickr.com/photos/visualpanic/856235055 Info from University of Texas at Austin’s Information Technology Services
  • 24. Flickr CC Photo by Jason Pearce: http://www.flickr.com/photos/jasonpearce/4750110576 Info from University of Texas at Austin’s Information Technology Services Make your password long and complex, so it is hard to crack. Between 8 to 20 characters long is recommended.
  • 25. Use one or more of these special characters: !@#$%*()-+=,<>::“‘ Info from University of Texas at Austin’s Information Technology Services
  • 26. To help you easily remember your password, consider using a phrase or a song title as a password. For example, “Somewhere Over the Rainbow” becomes “Sw0tR8nBO” or “Smells Like Teen Spirit” becomes “sMll10nspT.” Flickr CC Photo by marc falardeau: http://www.flickr.com/photos/49889874@N05/6101434856 Info from University of Texas at Austin’s Information Technology Services
  • 27. Make your password easy to type quickly. This will make it harder for someone looking over your shoulder to steal it. Flickr CC Photo by Chris Metcalf: http://www.flickr.com/photos/laffy4k/441037582 Info from University of Texas at Austin’s Information Technology Services
  • 28. Using your password safely Create different passwords for different accounts and applications. That way, if one account is breached, your other accounts won’t be put at risk too. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1454251440 Info from University of Texas at Austin’s Information Technology Services
  • 29. Change your passwords regularly, about once every six months. (Daylight Savings Time?) Flickr CC Photo by Eliazar Parra Cardenas: http://www.flickr.com/photos/eliazar/407591133 Info from University of Texas at Austin’s Information Technology Services
  • 30. Flickr CC Photo by Mike Fernwood: http://www.flickr.com/photos/ultimateslug/326930489 Info from University of Texas at Austin’s Information Technology Services Don’t share your password with anyone else. Once it’s out of your control, so is your security.
  • 31. Never enable the “Save Password” option, even if prompted to do so. Pre-saved passwords make it easy for anyone else using your computer to access your accounts. http://www.rhsmith.umd.edu/portal/portal_help.html Info from University of Texas at Austin’s Information Technology Services
  • 32. Be especially careful about saving passwords in web browsers. http://www.webdevelopersnotes.com/how-do-i/clear- browsing-data-google-chrome.php
  • 33. Never walk away from a shared computer without logging off. This will ensure no other users can access your accounts. Flickr CC Photo by Totumweb: http://www.flickr.com/photos/totumweb/5601416590 Info from University of Texas at Austin’s Information Technology Services
  • 34. Don’t use sample passwords given on different Web sites, including this one. “Somewhere Over the Rainbow” becomes “Sw0tR8nBO” or “Smells Like Teen Spirit” becomes “sMll10nspT.” Info from University of Texas at Austin’s Information Technology Services