SlideShare une entreprise Scribd logo
1  sur  8
Most Common
Password Patterns
 Common Password Patterns
 Common Complexity Misconceptions
 Proof to Password Madness
 Get to the Point
 Your New Best friend
Overview:
• Using a name, place, or common word as the seed
• Capitalizing the first letter
• Adding a number at the end of the password or base word
• Adding one of the most common symbols (~, !, @, #, $, %, &, ?)
• Starting with uppercase followed by lower case
• Putting digits before or after letters
• Repeating previous passwords
Do these look familiar?
Most would think the methods below would create complex passwords,
but even these seemingly “complex” of passwords can be breached.
Deceivingly Simple Passwords…
Rule Pattern
Must consist of 2 upper case, 2 lower
case characters and 2 digits
uu33dd
Must consist of 9 digits and 1 letter d{9}L
Must consist of 10 alphanumeric
characters, where at least 1 is a letter
and at least 1 is a digit
LdA{8}
Must consist of 10 alphanumeric
characters, where at least 2 are upper
case and at least are 2 lower case
characters
uullA{6}
Must consist of 9 characters out of the
set "ABCDEF" and an '@' symbol
somewhere in it
@[ABCDEF]{9}
http://keepass.info/help/base/pwgenerator.html
Case Study by Korelogic:
Most
Common
Company
Password
Standards
One upper
case, then 6
lower case,
then 2 digits
(Example:
Abugmar64)
One upper
case, then 3
lower case,
then 4 digits
(Example:
Itio1981)
One upper
case, then 5
lower case,
then 2 digits
(Example:
Dulith57)
http://stateofthenet.net/2014/10/the-big-password-mistake-that-hackers-are-hoping-youll-make/
Password hacking is happening. Right now.
Your company might have made it so far without a breach, but what
about the future?
Let’s take a stroll back to this past year…
What is the Point?
Verizon's 2014 Data Breach Investigation Report concluded:
50 CONTRIBUTING GLOBAL ORGANIZATIONS
1,367 CONFIRMED DATA BREACHES
63,437 SECURITY INCIDENTS
95 COUNTRIES REPRESENTED
file:///C:/Users/bd1226/Downloads/rp_Verizon-DBIR-2014_en_xg.pdf
What do we do?
- nFront Password Filter allows up to 6 different password policies in the
same Windows domain
- Each password policy offers over 40 different rules
Sound complicated? Best part, IT’S NOT. We are here to:
• Eliminate risk of password hacking
• Create an easy to use password policy system
• Prevent user frustration
• Save the risk of losing expenses and time
nFront Security to the Rescue
To see how our nFront Password Filter product can help
your company prevent weak and easily hacked passwords
please visit our website.
http://nfrontsecurity.com/products/nfront-password-filter/

Contenu connexe

En vedette

Mobile testing introduction
Mobile testing introductionMobile testing introduction
Mobile testing introduction
QA Club Kiev
 
Sample presentation renebeth h. medina
Sample presentation renebeth h. medinaSample presentation renebeth h. medina
Sample presentation renebeth h. medina
Renebeth Vegiga
 
The Impact of Therapeutic Interventions
The Impact of Therapeutic InterventionsThe Impact of Therapeutic Interventions
The Impact of Therapeutic Interventions
Lori-Jo Curran
 
Njatc Presentation Acte Naae 08
Njatc Presentation Acte Naae 08Njatc Presentation Acte Naae 08
Njatc Presentation Acte Naae 08
rvb1019
 
2014 Anti-Corruption Public Procurement guide
2014 Anti-Corruption Public Procurement guide2014 Anti-Corruption Public Procurement guide
2014 Anti-Corruption Public Procurement guide
Dr Lendy Spires
 

En vedette (17)

Mobile testing introduction
Mobile testing introductionMobile testing introduction
Mobile testing introduction
 
Yachting Magazine Advertorial
Yachting Magazine AdvertorialYachting Magazine Advertorial
Yachting Magazine Advertorial
 
Game hai qua
Game hai quaGame hai qua
Game hai qua
 
Sample presentation renebeth h. medina
Sample presentation renebeth h. medinaSample presentation renebeth h. medina
Sample presentation renebeth h. medina
 
Happy engineers day background ppt
Happy engineers day background pptHappy engineers day background ppt
Happy engineers day background ppt
 
Available for sale
Available for saleAvailable for sale
Available for sale
 
Copyright_Carroll_2016
Copyright_Carroll_2016Copyright_Carroll_2016
Copyright_Carroll_2016
 
Clase3
Clase3Clase3
Clase3
 
The Impact of Therapeutic Interventions
The Impact of Therapeutic InterventionsThe Impact of Therapeutic Interventions
The Impact of Therapeutic Interventions
 
ご依頼の流れ
ご依頼の流れご依頼の流れ
ご依頼の流れ
 
Session 42 Peter Puusepp
Session 42 Peter PuuseppSession 42 Peter Puusepp
Session 42 Peter Puusepp
 
ACOOK_portfolio
ACOOK_portfolioACOOK_portfolio
ACOOK_portfolio
 
Njatc Presentation Acte Naae 08
Njatc Presentation Acte Naae 08Njatc Presentation Acte Naae 08
Njatc Presentation Acte Naae 08
 
New company catalog 2016
New company catalog 2016New company catalog 2016
New company catalog 2016
 
RunSignUp Corral Management System
RunSignUp Corral Management SystemRunSignUp Corral Management System
RunSignUp Corral Management System
 
2014 Anti-Corruption Public Procurement guide
2014 Anti-Corruption Public Procurement guide2014 Anti-Corruption Public Procurement guide
2014 Anti-Corruption Public Procurement guide
 
Evaluation 1
Evaluation 1Evaluation 1
Evaluation 1
 

Similaire à Common Password Patterns

Email Data Cleaning
Email Data CleaningEmail Data Cleaning
Email Data Cleaning
feiwin
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
University of Hertfordshire
 

Similaire à Common Password Patterns (20)

PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
The tyranny of averages
The tyranny of averagesThe tyranny of averages
The tyranny of averages
 
Password management
Password managementPassword management
Password management
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Email Data Cleaning
Email Data CleaningEmail Data Cleaning
Email Data Cleaning
 
Securing password
Securing passwordSecuring password
Securing password
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Password Protection
Password ProtectionPassword Protection
Password Protection
 
Web20security
Web20securityWeb20security
Web20security
 
Interpolique
InterpoliqueInterpolique
Interpolique
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Interpolique
InterpoliqueInterpolique
Interpolique
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Write your Ruby in Style
Write your Ruby in StyleWrite your Ruby in Style
Write your Ruby in Style
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
 
Python slide
Python slidePython slide
Python slide
 
issue15
issue15issue15
issue15
 

Plus de nFront Security (6)

Better Passwords = Better Security
Better Passwords = Better SecurityBetter Passwords = Better Security
Better Passwords = Better Security
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
The Windows Password Policy is Not Enough
The Windows Password Policy is Not EnoughThe Windows Password Policy is Not Enough
The Windows Password Policy is Not Enough
 
How a Windows Password Filters Works
How a Windows Password Filters WorksHow a Windows Password Filters Works
How a Windows Password Filters Works
 
PCI Password Policy Compliance
PCI Password Policy CompliancePCI Password Policy Compliance
PCI Password Policy Compliance
 
nFront Password Filter Overview
nFront Password Filter OverviewnFront Password Filter Overview
nFront Password Filter Overview
 

Dernier

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Dernier (20)

WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 

Common Password Patterns

  • 2.  Common Password Patterns  Common Complexity Misconceptions  Proof to Password Madness  Get to the Point  Your New Best friend Overview:
  • 3. • Using a name, place, or common word as the seed • Capitalizing the first letter • Adding a number at the end of the password or base word • Adding one of the most common symbols (~, !, @, #, $, %, &, ?) • Starting with uppercase followed by lower case • Putting digits before or after letters • Repeating previous passwords Do these look familiar?
  • 4. Most would think the methods below would create complex passwords, but even these seemingly “complex” of passwords can be breached. Deceivingly Simple Passwords… Rule Pattern Must consist of 2 upper case, 2 lower case characters and 2 digits uu33dd Must consist of 9 digits and 1 letter d{9}L Must consist of 10 alphanumeric characters, where at least 1 is a letter and at least 1 is a digit LdA{8} Must consist of 10 alphanumeric characters, where at least 2 are upper case and at least are 2 lower case characters uullA{6} Must consist of 9 characters out of the set "ABCDEF" and an '@' symbol somewhere in it @[ABCDEF]{9} http://keepass.info/help/base/pwgenerator.html
  • 5. Case Study by Korelogic: Most Common Company Password Standards One upper case, then 6 lower case, then 2 digits (Example: Abugmar64) One upper case, then 3 lower case, then 4 digits (Example: Itio1981) One upper case, then 5 lower case, then 2 digits (Example: Dulith57) http://stateofthenet.net/2014/10/the-big-password-mistake-that-hackers-are-hoping-youll-make/
  • 6. Password hacking is happening. Right now. Your company might have made it so far without a breach, but what about the future? Let’s take a stroll back to this past year… What is the Point? Verizon's 2014 Data Breach Investigation Report concluded: 50 CONTRIBUTING GLOBAL ORGANIZATIONS 1,367 CONFIRMED DATA BREACHES 63,437 SECURITY INCIDENTS 95 COUNTRIES REPRESENTED file:///C:/Users/bd1226/Downloads/rp_Verizon-DBIR-2014_en_xg.pdf
  • 7. What do we do? - nFront Password Filter allows up to 6 different password policies in the same Windows domain - Each password policy offers over 40 different rules Sound complicated? Best part, IT’S NOT. We are here to: • Eliminate risk of password hacking • Create an easy to use password policy system • Prevent user frustration • Save the risk of losing expenses and time nFront Security to the Rescue
  • 8. To see how our nFront Password Filter product can help your company prevent weak and easily hacked passwords please visit our website. http://nfrontsecurity.com/products/nfront-password-filter/