SlideShare a Scribd company logo
1 of 35
Password Security
ASHLEY MIDDLETON 2020
Here’s what you will learn…
This course will teach you how to keep your accounts and
devices safe with secure use of passwords and authentication.
YOU WILL LEARN: WHY HAVING STRONG
PASSWORDS REALLY
MATTERS
WHAT ACTUALLY MAKES
A SECURE PASSWORD
WHY YOU SHOULDN’T
REUSE PASSWORDS
HOW TO CREATE A
PASSWORD THAT’S EASY
TO REMEMBER BUT
HARD TO GUESS
WHAT NOT TO DO WITH
YOUR PASSWORDS
WHAT MULTI-FACTOR
AUTHENTICATION IS
AND WHY YOU SHOULD
USE IT
WHY HAVING STRONG
PASSWORDS REALLY
MATTERS
ASHLEY MIDDLETON (C) 2020 2
Why having strong passwords really matters
You’ve probably heard people talk about the importance of password security before. But does it really
matter what passwords you use - does anyone really care that much about getting into your accounts?
Password security matters because:
Any company account or device can contain information that’s lucrative to cybercriminals
Exposure of customer or business data can be highly damaging to your organisation
Ensuring only authorised users can log in to devices and systems helps maintain accountability
ASHLEY MIDDLETON (C) 2020 3
Password security matters because:
Any company account or device can contain information that’s lucrative to cybercriminals
Exposure of customer or business data can be highly damaging to your organisation
Ensuring only authorised users can log in to devices and systems helps maintain accountability
ASHLEY MIDDLETON (C) 2020 4
How an attacker could guess your password
How an attacker could guess your password
You may have previously heard various advice about what makes for a strong password.
To know what makes for a secure password, it’s important to understand how attackers will try to
compromise passwords.
ASHLEY MIDDLETON (C) 2020 5
The most
common attack
vector
ASHLEY MIDDLETON (C) 2020 6
The most common ways that
cybercriminals will attempt to
compromise passwords are:
Lists of common passwords. Passwords
like abc123 and P@ssword1 will be
attempted first by attackers.
Personal information. An attacker could
use information like birthdays and pet
names that are often easily found on
social media.
Passwords
compromised
ASHLEY MIDDLETON (C) 2020 7
Using brute-force attacks. The last resort for an
attacker is a brute-force attack, which involves
going through characters systematically until
your password is arrived at (i.e. aaa, aab, aac,
and so on…)
Passwords compromised through breaches. If a
site experiences a breach and your password is
exposed, an attacker may try that password to
log into your accounts on other services.
Why you shouldn’t reuse passwords?
While it’s common advice that you should never reuse passwords, the
important thing is to never reuse passwords for anything that matters.
Websites and user databases are breached all the time, which may
allow cybercriminals to crack the passwords that users of those sites
used. They can then attempt a combination of the email you used to
sign up for the site and the password you used on the site to attempt to
log in to any other service or website.
If you have reused your password anywhere else, the attacker will be
able to get in instantly.
ASHLEY MIDDLETON (C) 2020 8
How to create a password that’s easy to
remember but hard to crack
A perfect password would be one that was easy to remember but impossible to crack.
While a perfect password is not possible, there is a technique you can use to get as close to it as you can:
the three random words technique.
Pick three entirely random words, such as raven clockwork burger (don’t choose any words that could be
tied to you or your organisation, interests or family)
Put the three random words together
ASHLEY MIDDLETON (C) 2020 9
ASHLEY MIDDLETON (C) 2020
10
Congratulations, you have a password that’s incredibly hard to crack but one that
you already remember!
Keeping your password safe
It's important to create a strong password, but the effort will be wasted if you don't take steps to keep your
password safe.
You should:
Never write down passwords on paper
Never share passwords with colleagues or anyone else
Never send passwords in emails, text messages or in any other way to anyone else
Never give your password to anyone, even the IT team will never need it
ASHLEY MIDDLETON (C) 2020 11
Multi-factor authentication
While having a secure password is essential, it still may not be enough to stop an attacker.
The more secure your password is the smaller the chance that a cybercriminal could randomly guess it -
but it can always happen.
A site may also cause your password to become compromised in a breach.
ASHLEY MIDDLETON (C) 2020 12
Multi-factor authentication
Multi-factor authentication protects your accounts by making you need another method of authentication
in addition to your password when you sign in.
This additional method could be:
A code from an authentication app
A code from a text message or email
An authenticated removable device
If you have anything worth protecting on an account, you should always turn on multi-factor
authentication when it's available.
ASHLEY MIDDLETON (C) 2020 13
When you are ready to
continue to the questions
section,
TICK ALL THE BOXES TO CONTINUE!
ASHLEY MIDDLETON (C) 2020 14
Why having strong passwords matters
How an attacker could breach your password
Why you shouldn't reuse passwords
Why using two-factor authentication helps to boost data security
ASHLEY MIDDLETON (C) 2020 15
How might your social media use affect your password security?
Social media sites sell your passwords to cybercriminals
If your password is related to your family, pets or interests, social media could allow it to be
guessed
Your friends on social media will be able to see your passwords
ASHLEY MIDDLETON (C) 2020 16
Question 1
Using a pattern on your
keyboard will allow you to
easily create a strong but
memorable password?
True or False
ASHLEY MIDDLETON (C) 2020 17
Question 1- Answer
Using a pattern on your
keyboard will allow you to
easily create a strong but
memorable password?
False:
It may memorable but it
wouldn’t be strong
ASHLEY MIDDLETON (C) 2020 18
Question 2
If you're not in a job role where you
regularly send or receive
confidential information over email,
it doesn't really matter if you have a
strong password for your email or
not?
Yes or No
ASHLEY MIDDLETON (C) 2020 19
Question 2 - Answer
Correct:
There is a lot that a cybercriminal could do with access to a
company email, so it is essential to protect all email
accounts with strong passwords.
ASHLEY MIDDLETON (C) 2020 20
Question 3
Which of these
examples is the most
secure password
combination?
QWERTY
P@ssword1
clockworkeightydumbbell
ASHLEY MIDDLETON (C) 2020 21
Question 3 - Answer
Correct:
Having three random words
make up your password makes it
very difficult to crack while
being reasonably easy to
remember.
clockworkeightydumbbell
ASHLEY MIDDLETON (C) 2020 22
Question 4
You have just started using a
new application for processing
confidential data. You've created
a strong password, but is there
anything else you can do to help
keep your account secure?
Write down your password somewhere
safe
Provide answers to security questions
so you can recover the account if needed
Turn on multi-factor authentication
ASHLEY MIDDLETON (C) 2020 23
Question 4 - Answer
Correct:
Turn on multi-factor
authentication
Multi-factor authentication is
essential for keeping confidential
apps secure, as it adds another
layer of security.
ASHLEY MIDDLETON (C) 2020 24
Question 5
What does multi-
factor
authentication
do?
It makes your accounts ask for
multiple passwords instead of just one
It makes your accounts ask for
another method of authentication in
addition to your password
ASHLEY MIDDLETON (C) 2020 25
Question 5 - Answer
Correct:
This another method
could be a code from an
authentication app, text
message or email.
It makes your accounts automatically
detect cybercriminals trying to hack
their way in, because they cant
authenticate.
(They don’t have the additional bit of information
or authentication key)
ASHLEY MIDDLETON (C) 2020 26
Question 6
You have created strong
passwords for all your
accounts, but keep
forgetting them. What
should you do?
Switch to using the same password for everything
Write down your passwords on post-it notes on your
monitor
Write down your passwords in a spreadsheet
Ask your IT team if they can provide you any tips or
tools like password managers that you can use for
password management
ASHLEY MIDDLETON (C) 2020 27
Question 6 - Answer
Correct:
There are tools available that can help you manage your
passwords, but you should check with your IT support team
before using them.
ASHLEY MIDDLETON (C) 2020 28
Question 7
It's safest to create one
strong password and to
reuse it across all your
accounts and devices?
True / False
ASHLEY MIDDLETON (C) 2020 29
Question 7 - Answer
Correct:
You should not reuse passwords, because if you did and one
leaked it would expose all your other accounts.
ASHLEY MIDDLETON (C) 2020 30
Question 8
Who should you
share your passwords
with?
Colleagues
Your partner
Your manager
Nobody
ASHLEY MIDDLETON (C) 2020 31
Question 8 -Answer
Correct:
There is no reason why your manager or IT team would
need your password, as they can use account privileges to
access your accounts if required.
ASHLEY MIDDLETON (C) 2020 32
Question 9
What is the best way to
create a strong but
memorable password?
Use the name of your favourite singer or sports
team and add a number after it
The name of your pet, but add some special
characters
The same long and secure password you use
for everything else
Pick three random words and combine them
together
ASHLEY MIDDLETON (C) 2020 33
Question 9 - Answer
Correct:
This allows you to create a password like
'buttergamingmongoose' that's difficult to crack but
reasonably easy to remember.
ASHLEY MIDDLETON (C) 2020 34
Thank You
https://outlearn.training/

More Related Content

What's hot

The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentationMuhammadHossen
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainSecuRing
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 

What's hot (20)

Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Password Attack
Password Attack Password Attack
Password Attack
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Application Security: AI LLMs and ML Threats & Defenses
Application Security: AI LLMs and ML Threats & DefensesApplication Security: AI LLMs and ML Threats & Defenses
Application Security: AI LLMs and ML Threats & Defenses
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Phishing
PhishingPhishing
Phishing
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
SQL Injection
SQL Injection SQL Injection
SQL Injection
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chain
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Application Security
Application SecurityApplication Security
Application Security
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Password Security

A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfInfosec Train
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
importance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfimportance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfAbrahamGadissa
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?London School of Cyber Security
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Honeywords - BSides London 2014
Honeywords - BSides London 2014Honeywords - BSides London 2014
Honeywords - BSides London 2014Gavin Holt
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePrime Infoserv
 

Similar to Password Security (20)

A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdf
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
importance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfimportance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdf
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Honeywords - BSides London 2014
Honeywords - BSides London 2014Honeywords - BSides London 2014
Honeywords - BSides London 2014
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
Ways to protect your data from hacking
Ways to protect your data from hackingWays to protect your data from hacking
Ways to protect your data from hacking
 
Data breach
Data breachData breach
Data breach
 

More from Outlearn Training

01 the basics getting started with computers-esol
01 the basics getting started with computers-esol01 the basics getting started with computers-esol
01 the basics getting started with computers-esolOutlearn Training
 
The basics- getting started with computers-slide share
The basics- getting started with computers-slide shareThe basics- getting started with computers-slide share
The basics- getting started with computers-slide shareOutlearn Training
 
Structural presentation lesson 1
Structural presentation lesson 1Structural presentation lesson 1
Structural presentation lesson 1Outlearn Training
 
Ncfe level 1 award in graphic design
Ncfe level 1 award in graphic designNcfe level 1 award in graphic design
Ncfe level 1 award in graphic designOutlearn Training
 

More from Outlearn Training (7)

01 the basics getting started with computers-esol
01 the basics getting started with computers-esol01 the basics getting started with computers-esol
01 the basics getting started with computers-esol
 
The basics- getting started with computers-slide share
The basics- getting started with computers-slide shareThe basics- getting started with computers-slide share
The basics- getting started with computers-slide share
 
Structural presentation lesson 1
Structural presentation lesson 1Structural presentation lesson 1
Structural presentation lesson 1
 
Business project
Business projectBusiness project
Business project
 
Ncfe level 1 award in graphic design
Ncfe level 1 award in graphic designNcfe level 1 award in graphic design
Ncfe level 1 award in graphic design
 
Social media
Social mediaSocial media
Social media
 
Equality Act 2010
Equality Act 2010 Equality Act 2010
Equality Act 2010
 

Recently uploaded

Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 

Recently uploaded (20)

Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 

Password Security

  • 2. Here’s what you will learn… This course will teach you how to keep your accounts and devices safe with secure use of passwords and authentication. YOU WILL LEARN: WHY HAVING STRONG PASSWORDS REALLY MATTERS WHAT ACTUALLY MAKES A SECURE PASSWORD WHY YOU SHOULDN’T REUSE PASSWORDS HOW TO CREATE A PASSWORD THAT’S EASY TO REMEMBER BUT HARD TO GUESS WHAT NOT TO DO WITH YOUR PASSWORDS WHAT MULTI-FACTOR AUTHENTICATION IS AND WHY YOU SHOULD USE IT WHY HAVING STRONG PASSWORDS REALLY MATTERS ASHLEY MIDDLETON (C) 2020 2
  • 3. Why having strong passwords really matters You’ve probably heard people talk about the importance of password security before. But does it really matter what passwords you use - does anyone really care that much about getting into your accounts? Password security matters because: Any company account or device can contain information that’s lucrative to cybercriminals Exposure of customer or business data can be highly damaging to your organisation Ensuring only authorised users can log in to devices and systems helps maintain accountability ASHLEY MIDDLETON (C) 2020 3
  • 4. Password security matters because: Any company account or device can contain information that’s lucrative to cybercriminals Exposure of customer or business data can be highly damaging to your organisation Ensuring only authorised users can log in to devices and systems helps maintain accountability ASHLEY MIDDLETON (C) 2020 4
  • 5. How an attacker could guess your password How an attacker could guess your password You may have previously heard various advice about what makes for a strong password. To know what makes for a secure password, it’s important to understand how attackers will try to compromise passwords. ASHLEY MIDDLETON (C) 2020 5
  • 6. The most common attack vector ASHLEY MIDDLETON (C) 2020 6 The most common ways that cybercriminals will attempt to compromise passwords are: Lists of common passwords. Passwords like abc123 and P@ssword1 will be attempted first by attackers. Personal information. An attacker could use information like birthdays and pet names that are often easily found on social media.
  • 7. Passwords compromised ASHLEY MIDDLETON (C) 2020 7 Using brute-force attacks. The last resort for an attacker is a brute-force attack, which involves going through characters systematically until your password is arrived at (i.e. aaa, aab, aac, and so on…) Passwords compromised through breaches. If a site experiences a breach and your password is exposed, an attacker may try that password to log into your accounts on other services.
  • 8. Why you shouldn’t reuse passwords? While it’s common advice that you should never reuse passwords, the important thing is to never reuse passwords for anything that matters. Websites and user databases are breached all the time, which may allow cybercriminals to crack the passwords that users of those sites used. They can then attempt a combination of the email you used to sign up for the site and the password you used on the site to attempt to log in to any other service or website. If you have reused your password anywhere else, the attacker will be able to get in instantly. ASHLEY MIDDLETON (C) 2020 8
  • 9. How to create a password that’s easy to remember but hard to crack A perfect password would be one that was easy to remember but impossible to crack. While a perfect password is not possible, there is a technique you can use to get as close to it as you can: the three random words technique. Pick three entirely random words, such as raven clockwork burger (don’t choose any words that could be tied to you or your organisation, interests or family) Put the three random words together ASHLEY MIDDLETON (C) 2020 9
  • 10. ASHLEY MIDDLETON (C) 2020 10 Congratulations, you have a password that’s incredibly hard to crack but one that you already remember!
  • 11. Keeping your password safe It's important to create a strong password, but the effort will be wasted if you don't take steps to keep your password safe. You should: Never write down passwords on paper Never share passwords with colleagues or anyone else Never send passwords in emails, text messages or in any other way to anyone else Never give your password to anyone, even the IT team will never need it ASHLEY MIDDLETON (C) 2020 11
  • 12. Multi-factor authentication While having a secure password is essential, it still may not be enough to stop an attacker. The more secure your password is the smaller the chance that a cybercriminal could randomly guess it - but it can always happen. A site may also cause your password to become compromised in a breach. ASHLEY MIDDLETON (C) 2020 12
  • 13. Multi-factor authentication Multi-factor authentication protects your accounts by making you need another method of authentication in addition to your password when you sign in. This additional method could be: A code from an authentication app A code from a text message or email An authenticated removable device If you have anything worth protecting on an account, you should always turn on multi-factor authentication when it's available. ASHLEY MIDDLETON (C) 2020 13
  • 14. When you are ready to continue to the questions section, TICK ALL THE BOXES TO CONTINUE! ASHLEY MIDDLETON (C) 2020 14
  • 15. Why having strong passwords matters How an attacker could breach your password Why you shouldn't reuse passwords Why using two-factor authentication helps to boost data security ASHLEY MIDDLETON (C) 2020 15
  • 16. How might your social media use affect your password security? Social media sites sell your passwords to cybercriminals If your password is related to your family, pets or interests, social media could allow it to be guessed Your friends on social media will be able to see your passwords ASHLEY MIDDLETON (C) 2020 16
  • 17. Question 1 Using a pattern on your keyboard will allow you to easily create a strong but memorable password? True or False ASHLEY MIDDLETON (C) 2020 17
  • 18. Question 1- Answer Using a pattern on your keyboard will allow you to easily create a strong but memorable password? False: It may memorable but it wouldn’t be strong ASHLEY MIDDLETON (C) 2020 18
  • 19. Question 2 If you're not in a job role where you regularly send or receive confidential information over email, it doesn't really matter if you have a strong password for your email or not? Yes or No ASHLEY MIDDLETON (C) 2020 19
  • 20. Question 2 - Answer Correct: There is a lot that a cybercriminal could do with access to a company email, so it is essential to protect all email accounts with strong passwords. ASHLEY MIDDLETON (C) 2020 20
  • 21. Question 3 Which of these examples is the most secure password combination? QWERTY P@ssword1 clockworkeightydumbbell ASHLEY MIDDLETON (C) 2020 21
  • 22. Question 3 - Answer Correct: Having three random words make up your password makes it very difficult to crack while being reasonably easy to remember. clockworkeightydumbbell ASHLEY MIDDLETON (C) 2020 22
  • 23. Question 4 You have just started using a new application for processing confidential data. You've created a strong password, but is there anything else you can do to help keep your account secure? Write down your password somewhere safe Provide answers to security questions so you can recover the account if needed Turn on multi-factor authentication ASHLEY MIDDLETON (C) 2020 23
  • 24. Question 4 - Answer Correct: Turn on multi-factor authentication Multi-factor authentication is essential for keeping confidential apps secure, as it adds another layer of security. ASHLEY MIDDLETON (C) 2020 24
  • 25. Question 5 What does multi- factor authentication do? It makes your accounts ask for multiple passwords instead of just one It makes your accounts ask for another method of authentication in addition to your password ASHLEY MIDDLETON (C) 2020 25
  • 26. Question 5 - Answer Correct: This another method could be a code from an authentication app, text message or email. It makes your accounts automatically detect cybercriminals trying to hack their way in, because they cant authenticate. (They don’t have the additional bit of information or authentication key) ASHLEY MIDDLETON (C) 2020 26
  • 27. Question 6 You have created strong passwords for all your accounts, but keep forgetting them. What should you do? Switch to using the same password for everything Write down your passwords on post-it notes on your monitor Write down your passwords in a spreadsheet Ask your IT team if they can provide you any tips or tools like password managers that you can use for password management ASHLEY MIDDLETON (C) 2020 27
  • 28. Question 6 - Answer Correct: There are tools available that can help you manage your passwords, but you should check with your IT support team before using them. ASHLEY MIDDLETON (C) 2020 28
  • 29. Question 7 It's safest to create one strong password and to reuse it across all your accounts and devices? True / False ASHLEY MIDDLETON (C) 2020 29
  • 30. Question 7 - Answer Correct: You should not reuse passwords, because if you did and one leaked it would expose all your other accounts. ASHLEY MIDDLETON (C) 2020 30
  • 31. Question 8 Who should you share your passwords with? Colleagues Your partner Your manager Nobody ASHLEY MIDDLETON (C) 2020 31
  • 32. Question 8 -Answer Correct: There is no reason why your manager or IT team would need your password, as they can use account privileges to access your accounts if required. ASHLEY MIDDLETON (C) 2020 32
  • 33. Question 9 What is the best way to create a strong but memorable password? Use the name of your favourite singer or sports team and add a number after it The name of your pet, but add some special characters The same long and secure password you use for everything else Pick three random words and combine them together ASHLEY MIDDLETON (C) 2020 33
  • 34. Question 9 - Answer Correct: This allows you to create a password like 'buttergamingmongoose' that's difficult to crack but reasonably easy to remember. ASHLEY MIDDLETON (C) 2020 34