SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
STEPHANY LORENA PRADO RIASCOS UNIT 9 LESSON D – PAG 93 Keepingitsafe
WHAT IS PERSONAL INFORMATION OR SAFETY This refers to information that can be used to identify, contact or locate a specific person, or be used along with other information sources to do.
¡¡¡DIFFERENT WAYS TO PROTECT YOUR PERSONAL ACCOUNTS!!! To an attacker, a strong password should look like a random string of characters. You can get your password is safe if it uses the following criteria: ,[object Object],[object Object]
The fewer types of characters in the password, the longer it must be. A 15-character password composed only of random letters and numbers is about 33,000 times stronger than an 8-character password composed of characters of all kinds. If the password can not contain symbols, should be considerably longer to achieve the same degree of protection. An ideal password combines both length and different types of symbols.,[object Object],[object Object]
3. If the computer or online system does not support pass phrases, convert it to a password. Use the first letter of each word in the phrase that has been created to define a new, nonsensical word. Taking the above example sentence, we have: "mhatta."  4. Add complexity by mixing uppercase and lowercase letters and numbers. Also useful letter swapping or misspellings as well. For example, in the previous sentence, consider misspelling Aiden's name, or substituting the word "three" with the number (3). There are many possible substitutions, the longer the sentence, the more complex the password. The phrase might eventually become "My Son is 3 yeeRs Ang3l." If the computer or online system does not support pass phrases, use the same technique on the shorter password. The result could be a password like "MsAy3yo." 
5. Finally, substitute some special characters. You can use symbols that look like letters, combine words (remove spaces) and use other means to make the password more complex. Using these tricks, we create a pass phrase as "MiHiJo @ ng3l ti3n3 3 anionic $" or a shorter password (using the first letters of each word) "@ T3a Mihi."  6. Try the password with Password Checker. Password Checker is a feature of this Web site that helps you determine the level of security offered by a password as you type (such figures are not recorded). 
IN CONCLUSION!!!! The surest way to protect personal accounts including e-mail, pin etc.Is making appropriate use of each of these, besides being in constant change passwords, and involve a combination of letters and numbers in each of your accounts.But should not publish personal information on social networks, or provide information to strangers.
THANK YOU HOPE TO BE OF THEIR USE
Page 93 blog 4
Page 93 blog 4

Weitere ähnliche Inhalte

Ähnlich wie Page 93 blog 4

Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwordsahyaimie
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A BlogToby1
 
Password Storage Explained
Password Storage ExplainedPassword Storage Explained
Password Storage Explainedjeetendra mandal
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
How to Create a Strong Password.pdf
How to Create a Strong Password.pdfHow to Create a Strong Password.pdf
How to Create a Strong Password.pdfinfosec train
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Passwordmoli he
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password PatternsnFront Security
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdfData Hops
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 

Ähnlich wie Page 93 blog 4 (20)

Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
Password Protection
Password ProtectionPassword Protection
Password Protection
 
Document
DocumentDocument
Document
 
Password management
Password managementPassword management
Password management
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Use of capital letters
Use of capital lettersUse of capital letters
Use of capital letters
 
Password Storage Explained
Password Storage ExplainedPassword Storage Explained
Password Storage Explained
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
How to Create a Strong Password.pdf
How to Create a Strong Password.pdfHow to Create a Strong Password.pdf
How to Create a Strong Password.pdf
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Secure passwords
Secure passwordsSecure passwords
Secure passwords
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Password
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password Patterns
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdf
 
Is your password_safe_ss
Is your password_safe_ssIs your password_safe_ss
Is your password_safe_ss
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 

Mehr von Stephy Prado

Articulo ingles final
Articulo ingles finalArticulo ingles final
Articulo ingles finalStephy Prado
 
A letter to editor
A letter to editorA letter to editor
A letter to editorStephy Prado
 
La organizacion que aprende
La organizacion que aprendeLa organizacion que aprende
La organizacion que aprendeStephy Prado
 
Pelicula de ingles
Pelicula de inglesPelicula de ingles
Pelicula de inglesStephy Prado
 
Things i´d change blog 3
Things i´d change blog 3Things i´d change blog 3
Things i´d change blog 3Stephy Prado
 
Things i´d change blog 3
Things i´d change blog 3Things i´d change blog 3
Things i´d change blog 3Stephy Prado
 
My circle of friends
My  circle of friendsMy  circle of friends
My circle of friendsStephy Prado
 

Mehr von Stephy Prado (10)

Articulo ingles final
Articulo ingles finalArticulo ingles final
Articulo ingles final
 
A letter to editor
A letter to editorA letter to editor
A letter to editor
 
Los empresarios
Los empresariosLos empresarios
Los empresarios
 
La organizacion que aprende
La organizacion que aprendeLa organizacion que aprende
La organizacion que aprende
 
La informacion
La informacionLa informacion
La informacion
 
Pelicula de ingles
Pelicula de inglesPelicula de ingles
Pelicula de ingles
 
Page 93 blog 4
Page 93 blog 4Page 93 blog 4
Page 93 blog 4
 
Things i´d change blog 3
Things i´d change blog 3Things i´d change blog 3
Things i´d change blog 3
 
Things i´d change blog 3
Things i´d change blog 3Things i´d change blog 3
Things i´d change blog 3
 
My circle of friends
My  circle of friendsMy  circle of friends
My circle of friends
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

Page 93 blog 4

  • 1. STEPHANY LORENA PRADO RIASCOS UNIT 9 LESSON D – PAG 93 Keepingitsafe
  • 2. WHAT IS PERSONAL INFORMATION OR SAFETY This refers to information that can be used to identify, contact or locate a specific person, or be used along with other information sources to do.
  • 3.
  • 4.
  • 5. 3. If the computer or online system does not support pass phrases, convert it to a password. Use the first letter of each word in the phrase that has been created to define a new, nonsensical word. Taking the above example sentence, we have: "mhatta."  4. Add complexity by mixing uppercase and lowercase letters and numbers. Also useful letter swapping or misspellings as well. For example, in the previous sentence, consider misspelling Aiden's name, or substituting the word "three" with the number (3). There are many possible substitutions, the longer the sentence, the more complex the password. The phrase might eventually become "My Son is 3 yeeRs Ang3l." If the computer or online system does not support pass phrases, use the same technique on the shorter password. The result could be a password like "MsAy3yo." 
  • 6. 5. Finally, substitute some special characters. You can use symbols that look like letters, combine words (remove spaces) and use other means to make the password more complex. Using these tricks, we create a pass phrase as "MiHiJo @ ng3l ti3n3 3 anionic $" or a shorter password (using the first letters of each word) "@ T3a Mihi."  6. Try the password with Password Checker. Password Checker is a feature of this Web site that helps you determine the level of security offered by a password as you type (such figures are not recorded). 
  • 7. IN CONCLUSION!!!! The surest way to protect personal accounts including e-mail, pin etc.Is making appropriate use of each of these, besides being in constant change passwords, and involve a combination of letters and numbers in each of your accounts.But should not publish personal information on social networks, or provide information to strangers.