SlideShare une entreprise Scribd logo
1  sur  16
Username Usage and Password Security
Username Usage
Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
Good or Bad? ,[object Object]
 BellaIsabella
 DarkAngel666
 Karla-Love-1996
 SimplyMe
 gun4hiRe
 babyfaceLA
 Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
Password Security
Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event  The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band

Contenu connexe

En vedette

Kelly Clarkson
Kelly ClarksonKelly Clarkson
Kelly Clarksontanica
 
A haiti
A haitiA haiti
A haititanica
 
In The Annals Of Rock History The Who
In The Annals Of Rock History The WhoIn The Annals Of Rock History The Who
In The Annals Of Rock History The Whotanica
 
Building specialized industry applications using Solr, and migration from FAS...
Building specialized industry applications using Solr, and migration from FAS...Building specialized industry applications using Solr, and migration from FAS...
Building specialized industry applications using Solr, and migration from FAS...Lucidworks (Archived)
 
C:\Fakepath\I Love You Mommy
C:\Fakepath\I Love You MommyC:\Fakepath\I Love You Mommy
C:\Fakepath\I Love You MommyNyiah
 
Minneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache Solr
Minneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache SolrMinneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache Solr
Minneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache SolrLucidworks (Archived)
 
Pangaea providing access to geoscientific data using apache lucene java
Pangaea   providing access to geoscientific data using apache lucene javaPangaea   providing access to geoscientific data using apache lucene java
Pangaea providing access to geoscientific data using apache lucene javaLucidworks (Archived)
 
ブラウザー勉強会始めました
ブラウザー勉強会始めましたブラウザー勉強会始めました
ブラウザー勉強会始めました彰 村地
 
2010 10-building-global-listening-platform-with-solr
2010 10-building-global-listening-platform-with-solr2010 10-building-global-listening-platform-with-solr
2010 10-building-global-listening-platform-with-solrLucidworks (Archived)
 
Integrating Advanced Text Analytics into Solr
Integrating Advanced Text Analytics into SolrIntegrating Advanced Text Analytics into Solr
Integrating Advanced Text Analytics into SolrLucidworks (Archived)
 

En vedette (17)

Kelly Clarkson
Kelly ClarksonKelly Clarkson
Kelly Clarkson
 
A haiti
A haitiA haiti
A haiti
 
In The Annals Of Rock History The Who
In The Annals Of Rock History The WhoIn The Annals Of Rock History The Who
In The Annals Of Rock History The Who
 
Building specialized industry applications using Solr, and migration from FAS...
Building specialized industry applications using Solr, and migration from FAS...Building specialized industry applications using Solr, and migration from FAS...
Building specialized industry applications using Solr, and migration from FAS...
 
C:\Fakepath\I Love You Mommy
C:\Fakepath\I Love You MommyC:\Fakepath\I Love You Mommy
C:\Fakepath\I Love You Mommy
 
Juan gris
Juan grisJuan gris
Juan gris
 
Open Source Search Applications
Open Source Search ApplicationsOpen Source Search Applications
Open Source Search Applications
 
Minneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache Solr
Minneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache SolrMinneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache Solr
Minneapolis Solr Meetup - May 28, 2014: eCommerce Search with Apache Solr
 
Mains aux fleurs
Mains aux fleursMains aux fleurs
Mains aux fleurs
 
What’s new in apache lucene 3.0
What’s new in apache lucene 3.0What’s new in apache lucene 3.0
What’s new in apache lucene 3.0
 
Presentation: IT Wizard Summer Camp
Presentation: IT Wizard Summer CampPresentation: IT Wizard Summer Camp
Presentation: IT Wizard Summer Camp
 
Pangaea providing access to geoscientific data using apache lucene java
Pangaea   providing access to geoscientific data using apache lucene javaPangaea   providing access to geoscientific data using apache lucene java
Pangaea providing access to geoscientific data using apache lucene java
 
ブラウザー勉強会始めました
ブラウザー勉強会始めましたブラウザー勉強会始めました
ブラウザー勉強会始めました
 
2010 10-building-global-listening-platform-with-solr
2010 10-building-global-listening-platform-with-solr2010 10-building-global-listening-platform-with-solr
2010 10-building-global-listening-platform-with-solr
 
Rapid Prototyping with Solr
Rapid Prototyping with SolrRapid Prototyping with Solr
Rapid Prototyping with Solr
 
What’s New in Apache Lucene 3.0
What’s New in Apache Lucene 3.0What’s New in Apache Lucene 3.0
What’s New in Apache Lucene 3.0
 
Integrating Advanced Text Analytics into Solr
Integrating Advanced Text Analytics into SolrIntegrating Advanced Text Analytics into Solr
Integrating Advanced Text Analytics into Solr
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Sample2

  • 1. Username Usage and Password Security
  • 3.
  • 4. Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
  • 5. Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
  • 6.
  • 13. Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
  • 14. Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
  • 16. Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band
  • 17. Why are student accounts easily hacked? The password is cracked using a password cracking program. The password is easily guessed by others who know personal things about the student. Students write their passwords down where others are able to see it. Students give their password to friends who then decide to use it or give it to others who use it. Other students see the password as the student enters it on a keyboard.
  • 19. Does your password include the name of a family member or pet? -3 Does your password include a birth date of a family member? -3 Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? -1 Does your password contain a random set of numbers? +2 Does your password contain both letters and numbers? +2 Does your password have 8 or more characters? +2 Does your password have less than 6 characters? -1 Does your password contain one or more non-number, non-letter characters such as a ! Or =? +3 Does the password contain the date of a well known event, such as the date a baseball team won the pennant? -1 Does your password contain at least 3 numbers in numerical sequence such as “123”? -2 Does your password contain any word spelled backwards? -1 Is your password written down on any piece of paper within 15 feet of your computer? -2 Does your password contain your telephone number, zip code, area code, or a portion of them? -2 Does your password include a mixture of UPPER and lower case letters? +2 Have you ever shared your current password with a friend? -3
  • 20. Password Test Scoring EXCELLENT 8 or higher SOMEWHAT GOOD 4-7 Think about adding some other characters to your password VERY POOR Less than 4 Time to make a new password
  • 21. Tips for a VERY STRONG password Always use a mix of letters and numbers Use a mix of UPPER and lower case letters Use characters that are not letters or number such as =!$# Always use a password that contains 6 letters or more Create acronyms (a word that is created by taking the first letter of a sequence of words)
  • 22. Individual Project Create a secure password Think of a line from a song and write it down. Create an acronym from the first letter of each word in the line. Change at lease one letter (not the first) to a capital letter. Add a non-number, non-letter character, or a substitute a ! For an I, $ for an s, etc. Add a two or three digit number.
  • 23. Individual Project Create a secure password Think of the name of someone you admire and write it down. Create a four-letter acronym from the first two letters of their first and last name. Change at least one letter (not the first) to a capital letter. Add a non-number, non-letter character or substitute a ! for an I, $ for an s, etc. Mix in two numbers taken from your age. Don’t put these numbers next to each other.

Notes de l'éditeur

  1. Show picture of boys – have students volunteer to come up to board and use 5 words to describe each boy.By a show of hands – Which boy do you think is more likely to be honest?Which boy do you think is more likely to be mean?Which boy do you think is more likely to be a good friend?Which boy do you think is a better students in school?Why do you think is? Based on looks?Which brings us to an important point – others judge us by how we look, dress, talk, etc. – do you feel that is a true statement? Why or why not? So, when you meet someone online – you only know their username, so the names we choose are very important – do you agree with that statement?
  2. Kids sometimes choose screen names that attract negative attention, hurtful or makes others feel uncomfortable. Choosing the wrong screen name can encourage others to treat you poorly. Explain why you think someone online might harass those with screen names such as these?
  3. Some students choose screen names that give away too much information about themselves. What can you tell about these users?If a stranger strikes up a conversation with you and states “I take karate too” would you be likely to engage in a conversation. Students have a tendency to think that since they are on the computer, the other person “cannot see them” – this is not true! – especially if that user can connect you to an email address.
  4. Have students come up to board – pick a user name that is either good or bad and explain the reasoning why – have them give specific information about what is wrong.
  5. print copies for students and have them work in groups – review names as a class
  6. Handouts – check your password