SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Challenges and Solutions
Jim Behnke and Jose DeLeon
…when does too many passwords
become a hindrance to instructors?
 Student records?
 Financial information?
 Photos of family / friends?
 Instructional materials?
 Research / doctoral thesis?
 Confidential survey data?
 Given that user names and passwords are
the norm…
 Why do people use weak passwords, or no
passwords at all, by preference?
 Too many passwords
 May prevent or discourage use of technology
 Difficult to track and organize efficiently
 Differing password complexity requirements
 Creating quality passwords
 Password Recall
 Password uniqueness
 MultifactorAuthentication
 Secure storage
 Portability (ability to access on multiple
computers / devices)
 Mixed Case
 Alphanumeric
 SpecialCharacters
 (!@#$%^&*()_+/*-+
 Unambiguous characters
 Il
 Password Length
 94x possibilities ( Z^U5yCeQ7k )
Hint: its not that easy!
 Memory (unreliable, impractical esp. with
decent passwords)
 Written Down (insecure)
 Stored in a plain text file (still insecure)
 Store in specialized Password Management
Software
http://keepass.info http://lastpass.com
Open-source password management database
James Behnke
 Database for secure
storage of user
accounts and
passwords
 FREE, “open-
source”
 Cross-platform
 DEMO SUMMARY:
 Stores data needed to accessWeb-based
applications
 Tools for securely generating and evaluating
passwords
 Makes using passwords convenient
 Encrypted data files
 What happens if someone steals your database
file?
 Wikipedia definition: “encryption”
“In cryptography, encryption is the process of
transforming information (referred to as
plaintext) using an algorithm (called cipher) to
make it unreadable to anyone except those
possessing special knowledge, usually
referred to as a key.”
http://en.wikipedia.org/wiki/Encryption
DO NOT LOOSEYOUR PASSWORD OR KEY FILE!
 Problem: How do I carry my
password database from
device to device?
 USB Flash Drives (for data files)
 MyFilesw/ “Xythos Drive” or OSX
 “DropBox” (www.dropbox.com) or
similar “data synchronization” service
 “Portable apps” (DEMO)
(http://portableapps.com/) or similar
application
KeyPass Pros KeyPass Cons
•Relatively easy to use
•Free
•Cross-platform inc. mobile
options
•Relatively secure
•Widespread use, many
“plugins”
•e.g. synchronize databases
between computers, automatically
enter information instead of copying
and pasting
•Currently, requires additional
effort / knowhow to make it
portable
•”Plugins” must be sought
out, installed, and toyed with
 Browser Based
 IE, Chrome, Safari, Firefox
 Portable
 Iphone, BlackBerry, Windows Phone, Symbian, Android
 USB Flash Drive
 Cloud
 Security
 SSL encryption on all traffic to Last Pass servers
 Database encrypted/decrypted at the client side with 256-bit
AES before transmission to servers
 Master password stored on servers as a hash.
 Screen Keyboard
 Phishing Protection
 Multifactor Authentication
 OTP – (OneTime Passwords)
 YUBIKEY – token based authentication
 Usability
 One Master Password
 Automatic Form Filling
 One Click Login
 SynchronizedAcross Browsers
 Securely Share Login Credentials
 Automatic Backup
 Password Generator
 Firefox 4 Beta:
 New Firefox provides service to synchronize
passwords between computers (.MP4 video)
 Google Chrome:

Weitere ähnliche Inhalte

Ähnlich wie Fordham Tech. Innovators - Password Management Presentation

Passwords & security
Passwords & securityPasswords & security
Passwords & securityPer Thorsheim
 
Drupal Security from Drupalcamp Cologne 2009
Drupal Security from Drupalcamp Cologne 2009Drupal Security from Drupalcamp Cologne 2009
Drupal Security from Drupalcamp Cologne 2009Gábor Hojtsy
 
Digital Preservation in the Wild
Digital Preservation in the WildDigital Preservation in the Wild
Digital Preservation in the WildTim Donohue
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Sourcehack33
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet SecurityJohn Dorner
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012Brian Layman
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101 Kojac801
 
Data management and office communication
Data management and office communicationData management and office communication
Data management and office communicationRomulo Lopez
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draftScott
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsBense Tony
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 

Ähnlich wie Fordham Tech. Innovators - Password Management Presentation (20)

Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Drupal Security from Drupalcamp Cologne 2009
Drupal Security from Drupalcamp Cologne 2009Drupal Security from Drupalcamp Cologne 2009
Drupal Security from Drupalcamp Cologne 2009
 
Digital Preservation in the Wild
Digital Preservation in the WildDigital Preservation in the Wild
Digital Preservation in the Wild
 
Training for Students
Training for StudentsTraining for Students
Training for Students
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Appy hour - Password presentation
Appy hour - Password presentationAppy hour - Password presentation
Appy hour - Password presentation
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
 
Hadoop Security
Hadoop SecurityHadoop Security
Hadoop Security
 
Firmware analysis 101
Firmware analysis 101Firmware analysis 101
Firmware analysis 101
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Security 101
Security 101Security 101
Security 101
 
Keep Your SIte Secure
Keep Your SIte SecureKeep Your SIte Secure
Keep Your SIte Secure
 
Hard Disk Encryptions
Hard Disk EncryptionsHard Disk Encryptions
Hard Disk Encryptions
 
Data management and office communication
Data management and office communicationData management and office communication
Data management and office communication
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draft
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Securing password
Securing passwordSecuring password
Securing password
 

Kürzlich hochgeladen

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Kürzlich hochgeladen (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Fordham Tech. Innovators - Password Management Presentation

  • 1. Challenges and Solutions Jim Behnke and Jose DeLeon
  • 2. …when does too many passwords become a hindrance to instructors?
  • 3.  Student records?  Financial information?  Photos of family / friends?  Instructional materials?  Research / doctoral thesis?  Confidential survey data?  Given that user names and passwords are the norm…  Why do people use weak passwords, or no passwords at all, by preference?
  • 4.  Too many passwords  May prevent or discourage use of technology  Difficult to track and organize efficiently  Differing password complexity requirements
  • 5.  Creating quality passwords  Password Recall  Password uniqueness  MultifactorAuthentication  Secure storage  Portability (ability to access on multiple computers / devices)
  • 6.  Mixed Case  Alphanumeric  SpecialCharacters  (!@#$%^&*()_+/*-+  Unambiguous characters  Il  Password Length  94x possibilities ( Z^U5yCeQ7k ) Hint: its not that easy!
  • 7.  Memory (unreliable, impractical esp. with decent passwords)  Written Down (insecure)  Stored in a plain text file (still insecure)  Store in specialized Password Management Software
  • 9. Open-source password management database James Behnke
  • 10.  Database for secure storage of user accounts and passwords  FREE, “open- source”  Cross-platform
  • 11.
  • 12.  DEMO SUMMARY:  Stores data needed to accessWeb-based applications  Tools for securely generating and evaluating passwords  Makes using passwords convenient  Encrypted data files
  • 13.  What happens if someone steals your database file?
  • 14.  Wikipedia definition: “encryption” “In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.” http://en.wikipedia.org/wiki/Encryption
  • 15. DO NOT LOOSEYOUR PASSWORD OR KEY FILE!
  • 16.  Problem: How do I carry my password database from device to device?
  • 17.  USB Flash Drives (for data files)  MyFilesw/ “Xythos Drive” or OSX  “DropBox” (www.dropbox.com) or similar “data synchronization” service  “Portable apps” (DEMO) (http://portableapps.com/) or similar application
  • 18.
  • 19. KeyPass Pros KeyPass Cons •Relatively easy to use •Free •Cross-platform inc. mobile options •Relatively secure •Widespread use, many “plugins” •e.g. synchronize databases between computers, automatically enter information instead of copying and pasting •Currently, requires additional effort / knowhow to make it portable •”Plugins” must be sought out, installed, and toyed with
  • 20.  Browser Based  IE, Chrome, Safari, Firefox  Portable  Iphone, BlackBerry, Windows Phone, Symbian, Android  USB Flash Drive  Cloud  Security  SSL encryption on all traffic to Last Pass servers  Database encrypted/decrypted at the client side with 256-bit AES before transmission to servers  Master password stored on servers as a hash.  Screen Keyboard  Phishing Protection
  • 21.  Multifactor Authentication  OTP – (OneTime Passwords)  YUBIKEY – token based authentication  Usability  One Master Password  Automatic Form Filling  One Click Login  SynchronizedAcross Browsers  Securely Share Login Credentials  Automatic Backup  Password Generator
  • 22.  Firefox 4 Beta:  New Firefox provides service to synchronize passwords between computers (.MP4 video)  Google Chrome:

Hinweis der Redaktion

  1. Small database program that is specifically designed to store and manage user accounts and passwords. It is free, “open source”; not supported by a large company, maintained by volunteers / communities of developers Versions exist for multiple platforms.
  2. Demo of key features: Materials: Sample database running “Portable Apps” Password entries organized by “Groups” Main features of a record: Descriptive title Username URL: Web site associated with the account Password “Quality” of the password” -Bar indicates quality - harder passwords have a larger bar “Comments” Allow you to write additional information regarding the account “Attachment” Word docs, PDF’s...relevant information Using the database to enter usernames and passwords into a Web page Using the database to enter passwords Simple method to enter passwords Button, “Copy Username to Clipboard” Button “Copy password toclipboard” Creating a new Record: Choose a group, choose an icon Password generation -Get to define complexity of the password -Often determined by the service that you want to sign on to -Can assist you in generating secure passwords Sorting Records -”View” > “Auto Sort password list” Searching Records -Search by title, content
  3. -Withkeypass on multiple computers, carry a “keyfile” on an external hard drive -MyFiles : connect to MyFiles share using “Xythos Drive” or through Mac OSX finder -”Dropbox”: Sync between multiple computers, may also work to sync with blackberry, iphone, etc. -”Portable Apps” (DEMO): run the program carry data on a USB drive; works with Windows (e.g. Smart Classroom) computers
  4. Firefox for iPhone coming out.