SlideShare a Scribd company logo
1 of 12
Unit-2
Password Selection,Piggybacking,shoulder
surfing
Password
 On computer systems where multiple users share disk
space and system resources, each user is given a
computer account.
 How does the system know who is authorized to access
and use this account?
 The user enters a password. If the user enters the
correct password, access is granted.
 When you first get your account, some computer
systems assign a password to you and you can't
change it, but on the vast majority of systems, including
the UNIX workstations in, it is up to the user to select a
password for his or her account.
 Selecting a strong password is the single most
important thing you can do to protect your information
from unauthorized access.
Need of Strong Password
 if your computer system is connected
to the internet, and almost all are
today, anyone in the world who can
connect to the internet can attempt to
access your account by guessing your
password.
 All that is needed is your account
name or id, and this information isn't
difficult to obtain on many computer
systems.
How to choose a strong
password
 uSE BoTh UppEr and loWEr Case
Characters, digits, punctuation, and
!@#$%^&* characters (and not just as the
last character of you password only) if your
computer system allows it. The more
complex and random the password is, the
harder it is to crack.
How to choose a strong
password
 You should try to choose a password that
uses the maximum number of characters
allowed. On UNIX systems, the maximum
password length is 8 characters. As a
minimum your password should be 6
characters.
 Change your password regularly
 Beware of people hanging over your
shoulder when you type your pas
 Don't use a word in the English dictionary or
a minor variation on that word.sword.
How to choose a strong
password
 Never tell your password to anyone.
 Never write your password down.
 Don't use simple patterns of adjacent
letters on the keyboard.(zxcvb etc.)
Shoulder Surfing
 Shoulder surfing refers to a direct observation,
such as looking over a person's shoulder, to
obtain information.
 In some cases shoulder surfing is done for no
reason other than to get an answer, but in other
instances it may constitute a security breach as
the the person behind may be gleaning private
information such as your PIN at a bank machine,
or Credit card information as you enter it into
 a Web based shopping cart check-out. While
shoulder surfing is most common in busy and
crowed areas where the perpetrator is not as
likely to be caught, shoulder surfing can also be
done with the aid of cameras from a more remote
location.
Shoulder Surf
Shoulder Surf-Prevention
 it is advised to shield paperwork or the
keypad from view by using one’s body
or cupping one’s hand.
 When working on a laptop, ensure that
your back is to a wall with no open
sides close to you or to enter your
passwords in a secluded location.
Piggybacking
 Piggybacking, in a wireless
communications context, is the
unauthorized access of a wireless
LAN.
 The usual purpose of piggybacking is
simply to gain free network access
rather than any malicious intent, but it
can slow down data transfer for
legitimate users of the network.
Piggybacking
 It's quite simple to access an unsecured
wireless network: All you have to do is
get into the range of a Wi-
Fi hotspot's signal and select your
chosen network from the options
presented.
 However, unauthorized network access,
even to free Wi-Fi, may be illegal. People
have been fined for accessing hot spots
from outside businesses, such as coffee
shops, that provide free Wi-Fi for
Piggybacking -Prevention
 To protect your network from
piggybacking, ensure that encryption is
enabled for yourrouter.
 Use Wireless Encryption Protocol (WEP)
if that's your only option, but if possible
use Wireless Protected Access (WPA) or
WPA2.
 Use a strong password for your
encryption key, consisting of at least 14
characters and mixing letters and
numbers.

More Related Content

What's hot

Network security
Network securityNetwork security
Network securityEstiak Khan
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryDaniel Miessler
 
Web services security
Web services securityWeb services security
Web services securitynurmeen1
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWARutvik patel
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Web security
Web securityWeb security
Web security
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 
Web services security
Web services securityWeb services security
Web services security
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Security testing
Security testingSecurity testing
Security testing
 
Aircrack
AircrackAircrack
Aircrack
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWA
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 

Viewers also liked

Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsYulian Slobodyan
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...Kenny Ong
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashingRafi Dar
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tablesadil raja
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Network security ppt
Network security pptNetwork security ppt
Network security pptshashi712
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 

Viewers also liked (20)

Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography Basics
 
it act
it actit act
it act
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashing
 
Ch17 Hashing
Ch17 HashingCh17 Hashing
Ch17 Hashing
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tables
 
Hashing PPT
Hashing PPTHashing PPT
Hashing PPT
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Hashing
HashingHashing
Hashing
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
biometrics
biometricsbiometrics
biometrics
 

Similar to Password selection,piggybacking-

Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingDanae Rosville
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security SystemMatthew Bricker
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfaoneonlinestore1
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfinfosec train
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4nayamat32
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Fego Ogwara
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 

Similar to Password selection,piggybacking- (20)

Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Network Security
Network SecurityNetwork Security
Network Security
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When Travelling
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
 
Wireless security
Wireless securityWireless security
Wireless security
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 

Password selection,piggybacking-

  • 2. Password  On computer systems where multiple users share disk space and system resources, each user is given a computer account.  How does the system know who is authorized to access and use this account?  The user enters a password. If the user enters the correct password, access is granted.  When you first get your account, some computer systems assign a password to you and you can't change it, but on the vast majority of systems, including the UNIX workstations in, it is up to the user to select a password for his or her account.  Selecting a strong password is the single most important thing you can do to protect your information from unauthorized access.
  • 3. Need of Strong Password  if your computer system is connected to the internet, and almost all are today, anyone in the world who can connect to the internet can attempt to access your account by guessing your password.  All that is needed is your account name or id, and this information isn't difficult to obtain on many computer systems.
  • 4. How to choose a strong password  uSE BoTh UppEr and loWEr Case Characters, digits, punctuation, and !@#$%^&* characters (and not just as the last character of you password only) if your computer system allows it. The more complex and random the password is, the harder it is to crack.
  • 5. How to choose a strong password  You should try to choose a password that uses the maximum number of characters allowed. On UNIX systems, the maximum password length is 8 characters. As a minimum your password should be 6 characters.  Change your password regularly  Beware of people hanging over your shoulder when you type your pas  Don't use a word in the English dictionary or a minor variation on that word.sword.
  • 6. How to choose a strong password  Never tell your password to anyone.  Never write your password down.  Don't use simple patterns of adjacent letters on the keyboard.(zxcvb etc.)
  • 7. Shoulder Surfing  Shoulder surfing refers to a direct observation, such as looking over a person's shoulder, to obtain information.  In some cases shoulder surfing is done for no reason other than to get an answer, but in other instances it may constitute a security breach as the the person behind may be gleaning private information such as your PIN at a bank machine, or Credit card information as you enter it into  a Web based shopping cart check-out. While shoulder surfing is most common in busy and crowed areas where the perpetrator is not as likely to be caught, shoulder surfing can also be done with the aid of cameras from a more remote location.
  • 9. Shoulder Surf-Prevention  it is advised to shield paperwork or the keypad from view by using one’s body or cupping one’s hand.  When working on a laptop, ensure that your back is to a wall with no open sides close to you or to enter your passwords in a secluded location.
  • 10. Piggybacking  Piggybacking, in a wireless communications context, is the unauthorized access of a wireless LAN.  The usual purpose of piggybacking is simply to gain free network access rather than any malicious intent, but it can slow down data transfer for legitimate users of the network.
  • 11. Piggybacking  It's quite simple to access an unsecured wireless network: All you have to do is get into the range of a Wi- Fi hotspot's signal and select your chosen network from the options presented.  However, unauthorized network access, even to free Wi-Fi, may be illegal. People have been fined for accessing hot spots from outside businesses, such as coffee shops, that provide free Wi-Fi for
  • 12. Piggybacking -Prevention  To protect your network from piggybacking, ensure that encryption is enabled for yourrouter.  Use Wireless Encryption Protocol (WEP) if that's your only option, but if possible use Wireless Protected Access (WPA) or WPA2.  Use a strong password for your encryption key, consisting of at least 14 characters and mixing letters and numbers.