SlideShare ist ein Scribd-Unternehmen logo
1 von 19
How to Create Strong Passwords
Introduction
O The stronger our password, the harder it is for someone
  to guess it and pretend to be us
O The stronger our password the more defensible it is
  against mass computer attacks
Question
O Experts have determined that a password
  should have a minimum of eight characters.
  Why eight and not seven? Why not 25? What is
  magical about the number eight?
Answer
O Based on research about
  human short-term memory
O Can, on average, remember
  between five and nine
  characters
O So eight characters is long
  enough to make a password
  strong but short enough that
  you can memorize it
Question
O Which do you think is a stronger password: one
  with 20 characters or one that is more complex
  in its use of seemingly random combinations of
  upper and lower case letters, numbers, and
  symbols?
Answer
O Security experts would answer that password
  length is more important for security than
  complexity
O Most people rely on dictionary words, words spelled
  backwards, repeated characters, or famous
  quotations
O Truly complex passwords, say those made by a
  random-password generator, are too difficult for
  most of us to remember. So we write them down for
  others to see and copy!
O The length of the password creates more characters
  which creates more possible combinations
Question
O Experts say that passwords using a
  combination of upper and lower case letters,
  numbers, and symbols are harder to crack than
  those that are all letters or all numbers. Why
  does this strategy make a password stronger?
  Let’s dissect some examples first and then
  consider what the experts say.
Which password is
         stronger?
                  A1b2c3d4
                  R4c7x3E1f
O the top password is an easy pattern, it would
  take fewer guesses to figure out
O the bottom password has no apparent
  pattern
Which password is
          stronger?
                  Go!jets#1!!
              Applesauce1212**
             M^s1ster|$ alw4ysf1ne!
O Favorite sports team connection is easy for someone
  to guess
   O Using your name or your birth month or date are also
     easy for someone to guess
O Dictionary words and repeated characters weaken a
  password’s strength
O The bottom password uses length, random
  capitalization and random simple substitutions, both
  making the password strong and easy to remember
Question
    O Why is a password
      stronger when we
      combine upper and
      lower case letters AND
      numbers AND
      symbols?
Answer
O Experts determine the strength of a password
  by the average number of guesses the attacker
  must make to find the correct password.
O Increasingly, they see evidence of sophisticated
  computer hacking attacks that try to crack
  open thousands of passwords each second.
O Using letters, both upper and lower case,
  numbers and any of the symbols on our
  computer keyboards increases the number of
  characters that must be guessed
Create a Complex,
     Creative Password
O How can you create a password that is easy
  enough for you to remember without writing
  down, but complex enough that no one could
  easily guess it? What if you first took the name
  of a favorite book, or a favorite movie or part of
  a funny joke that you could easily remember
  and then wrote it in a creative code?
Example
            The Phantom Tollbooth
             Ph@n+0m+0!!600+h

Experts say the trick is to use a code that is not
difficult to remember because once you write it
      down, anyone can find it and copy it
Table of
     Letters & Symbols
O Draw a table with two rows and eight
  columns
O In the eight boxes on the top, write a letter
O In the eight boxes below, write a
  corresponding symbol or number
Tips and Advice
  Provided by
   StaySafeOnline.org
Internet Use Agreement
     Orcutt Union School District
      Internet Use Agreement

Weitere ähnliche Inhalte

Ähnlich wie Password Protection

Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxAllanGuevarra1
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password PatternsnFront Security
 
Ltle570 mod4 carnill_final
Ltle570 mod4 carnill_finalLtle570 mod4 carnill_final
Ltle570 mod4 carnill_finalcarnillr
 
01 Good Passwords
01  Good  Passwords01  Good  Passwords
01 Good Passwordsryan.hackl
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Passwordmoli he
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of passwordAlimasmali3
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
Password Management
Password ManagementPassword Management
Password ManagementDavon Smart
 
Speech recognition - Art of the possible
Speech recognition - Art of the possibleSpeech recognition - Art of the possible
Speech recognition - Art of the possibleJisc
 
Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022Dominik Lukes
 
Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022Dominik Lukes
 
Creating Simple Web Text for People with Intellectual Disabilities and to Tra...
Creating Simple Web Text for People with Intellectual Disabilities and to Tra...Creating Simple Web Text for People with Intellectual Disabilities and to Tra...
Creating Simple Web Text for People with Intellectual Disabilities and to Tra...John Rochford
 

Ähnlich wie Password Protection (20)

Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptx
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password Patterns
 
Ltle570 mod4 carnill_final
Ltle570 mod4 carnill_finalLtle570 mod4 carnill_final
Ltle570 mod4 carnill_final
 
01 Good Passwords
01  Good  Passwords01  Good  Passwords
01 Good Passwords
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
 
Is your password_safe_ss
Is your password_safe_ssIs your password_safe_ss
Is your password_safe_ss
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Division inset
Division insetDivision inset
Division inset
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Password
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Password Management
Password ManagementPassword Management
Password Management
 
Speech recognition - Art of the possible
Speech recognition - Art of the possibleSpeech recognition - Art of the possible
Speech recognition - Art of the possible
 
Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022
 
Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022Speech Recognition: Art of the possible - DigiFest 2022
Speech Recognition: Art of the possible - DigiFest 2022
 
8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
Creating Simple Web Text for People with Intellectual Disabilities and to Tra...
Creating Simple Web Text for People with Intellectual Disabilities and to Tra...Creating Simple Web Text for People with Intellectual Disabilities and to Tra...
Creating Simple Web Text for People with Intellectual Disabilities and to Tra...
 
Teaching tools
Teaching toolsTeaching tools
Teaching tools
 

Mehr von Jenny Hubbard

Chapter 6 HW Answers
Chapter 6 HW AnswersChapter 6 HW Answers
Chapter 6 HW AnswersJenny Hubbard
 
Chapter 5 HW Answers
Chapter 5 HW AnswersChapter 5 HW Answers
Chapter 5 HW AnswersJenny Hubbard
 
CCA Chapter 4 HW Answers
CCA Chapter 4 HW AnswersCCA Chapter 4 HW Answers
CCA Chapter 4 HW AnswersJenny Hubbard
 
Chapter 2 Linear Functions
Chapter 2 Linear FunctionsChapter 2 Linear Functions
Chapter 2 Linear FunctionsJenny Hubbard
 
Unit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTUnit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTJenny Hubbard
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting CycleJenny Hubbard
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and CreditsJenny Hubbard
 
Unit 6 Renting vs. Buying
Unit 6 Renting vs. BuyingUnit 6 Renting vs. Buying
Unit 6 Renting vs. BuyingJenny Hubbard
 
Unit 6 Renting vs. Owning
Unit 6 Renting vs. OwningUnit 6 Renting vs. Owning
Unit 6 Renting vs. OwningJenny Hubbard
 
Calculating Simple and Compound Interest
Calculating Simple and Compound InterestCalculating Simple and Compound Interest
Calculating Simple and Compound InterestJenny Hubbard
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce ReadinessJenny Hubbard
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce ReadinessJenny Hubbard
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and CreditsJenny Hubbard
 
Unit 2 Financial Transactions
Unit 2 Financial TransactionsUnit 2 Financial Transactions
Unit 2 Financial TransactionsJenny Hubbard
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting EquationJenny Hubbard
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting EquationJenny Hubbard
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting EquationJenny Hubbard
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting CycleJenny Hubbard
 

Mehr von Jenny Hubbard (20)

CCA Chapter 7
CCA Chapter 7CCA Chapter 7
CCA Chapter 7
 
Chapter 6 HW Answers
Chapter 6 HW AnswersChapter 6 HW Answers
Chapter 6 HW Answers
 
Chapter 5 HW Answers
Chapter 5 HW AnswersChapter 5 HW Answers
Chapter 5 HW Answers
 
CCA Chapter 4 HW Answers
CCA Chapter 4 HW AnswersCCA Chapter 4 HW Answers
CCA Chapter 4 HW Answers
 
Chapter 2 Linear Functions
Chapter 2 Linear FunctionsChapter 2 Linear Functions
Chapter 2 Linear Functions
 
Chapter 1 Functions
Chapter 1 FunctionsChapter 1 Functions
Chapter 1 Functions
 
Unit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTUnit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPT
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and Credits
 
Unit 6 Renting vs. Buying
Unit 6 Renting vs. BuyingUnit 6 Renting vs. Buying
Unit 6 Renting vs. Buying
 
Unit 6 Renting vs. Owning
Unit 6 Renting vs. OwningUnit 6 Renting vs. Owning
Unit 6 Renting vs. Owning
 
Calculating Simple and Compound Interest
Calculating Simple and Compound InterestCalculating Simple and Compound Interest
Calculating Simple and Compound Interest
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce Readiness
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce Readiness
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and Credits
 
Unit 2 Financial Transactions
Unit 2 Financial TransactionsUnit 2 Financial Transactions
Unit 2 Financial Transactions
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
 

Kürzlich hochgeladen

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Password Protection

  • 1. How to Create Strong Passwords
  • 2. Introduction O The stronger our password, the harder it is for someone to guess it and pretend to be us O The stronger our password the more defensible it is against mass computer attacks
  • 3.
  • 4. Question O Experts have determined that a password should have a minimum of eight characters. Why eight and not seven? Why not 25? What is magical about the number eight?
  • 5. Answer O Based on research about human short-term memory O Can, on average, remember between five and nine characters O So eight characters is long enough to make a password strong but short enough that you can memorize it
  • 6. Question O Which do you think is a stronger password: one with 20 characters or one that is more complex in its use of seemingly random combinations of upper and lower case letters, numbers, and symbols?
  • 7. Answer O Security experts would answer that password length is more important for security than complexity O Most people rely on dictionary words, words spelled backwards, repeated characters, or famous quotations O Truly complex passwords, say those made by a random-password generator, are too difficult for most of us to remember. So we write them down for others to see and copy! O The length of the password creates more characters which creates more possible combinations
  • 8.
  • 9. Question O Experts say that passwords using a combination of upper and lower case letters, numbers, and symbols are harder to crack than those that are all letters or all numbers. Why does this strategy make a password stronger? Let’s dissect some examples first and then consider what the experts say.
  • 10. Which password is stronger? A1b2c3d4 R4c7x3E1f O the top password is an easy pattern, it would take fewer guesses to figure out O the bottom password has no apparent pattern
  • 11. Which password is stronger? Go!jets#1!! Applesauce1212** M^s1ster|$ alw4ysf1ne! O Favorite sports team connection is easy for someone to guess O Using your name or your birth month or date are also easy for someone to guess O Dictionary words and repeated characters weaken a password’s strength O The bottom password uses length, random capitalization and random simple substitutions, both making the password strong and easy to remember
  • 12. Question O Why is a password stronger when we combine upper and lower case letters AND numbers AND symbols?
  • 13. Answer O Experts determine the strength of a password by the average number of guesses the attacker must make to find the correct password. O Increasingly, they see evidence of sophisticated computer hacking attacks that try to crack open thousands of passwords each second. O Using letters, both upper and lower case, numbers and any of the symbols on our computer keyboards increases the number of characters that must be guessed
  • 14.
  • 15. Create a Complex, Creative Password O How can you create a password that is easy enough for you to remember without writing down, but complex enough that no one could easily guess it? What if you first took the name of a favorite book, or a favorite movie or part of a funny joke that you could easily remember and then wrote it in a creative code?
  • 16. Example The Phantom Tollbooth Ph@n+0m+0!!600+h Experts say the trick is to use a code that is not difficult to remember because once you write it down, anyone can find it and copy it
  • 17. Table of Letters & Symbols O Draw a table with two rows and eight columns O In the eight boxes on the top, write a letter O In the eight boxes below, write a corresponding symbol or number
  • 18. Tips and Advice Provided by StaySafeOnline.org
  • 19. Internet Use Agreement Orcutt Union School District Internet Use Agreement