STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class

Similar documents
Create strong passwords

Hitachi High Technologies America, Inc. Password Policy

ANNUAL SECURITY AWARENESS TRAINING 2012

PASSWORD SECURITY GUIDELINE

Accounts and Passwords

Your Virtual Assets. Designated Agent. Instructions

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Initial Direct Access Sign On/Change My Password/Forgot Password Overview

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Oakland University Obtaining Your 1098-T Electronically

CLAIM YOUR CUNYfirst ACCOUNT

Signing up for My Lahey Chart

Security Awareness Training June 2016

How to Build a Culture of Security

FAQ: Privacy, Security, and Data Protection at Libraries

Directions for Students to Retrieve 1098-Ts Electronically

Employee Security Awareness Training

Directions for Students to Retrieve 1098-Ts Electronically

PII Policies and Procedures

Benefit Enrollment User Guide

User Authentication. E.g., How can I tell you re you?

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

KeePass - to improve your process

PNC Prepaid Card Programs Cardholder Website How-To Manual

Single Sign-on Registration Guide

Keep Track of Your Passwords Easily

UNITED CHURCH OF CANADA

Registering and Creating Requests for myclinicalexchange

Registering and Creating Requests for myclinicalexchange

Registering and Paying for myclinicalexchange


1.1. HOW TO START? 1.2. ACCESS THE APP

COMPUTER PASSWORDS POLICY

State of Hawaii Department of Education. Self-Service Password Manager User Guide

Identity Theft and Online Security

Social Networking in Action

PIN / Password Security

Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Symbolic Links 4. Deploy A Firewall 5

Why was an extra step of choosing a Security Image added to the sign-in process?

Using your Employer Account

PCI Compliance. What is it? Who uses it? Why is it important?

Multi-Factor Authentication (MFA)

IS-906: Workplace Security Awareness. Visual 1 IS-906: Workplace Security Awareness

Assessment Data Online for Parents: Quick Start Guide

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Registration and Login

Identity Theft and Online Security

ADP Security Management Services

Protect Yourself From. Identify Theft

ITConnect MAKING PHOTO PRINTS ONLINE. Choosing Safe Passwords. De-clutter Your Desktop. Reminders in Outlook. Technology made practical for home

Information Technology

Changing Your Password

How to Navigate the AHIP Medicare Course. Subject Page #

1 About your new card

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

MU2b Authentication, Authorization and Accounting Questions Set 2

U s e r G u i d e. How do I book my CPD courses online? How do I find out whether I am on a course? How do I check up on the course details?

Go to neptun.elte.hu and switch to English.

LIBERTY On-line Portal Help Guide

Multi-Factor Authentication FAQs

Consumer Banking User Guide. Getting Started

Self Service Password Reset

JUNE 2018 Version 1.0. CU*ANSWERS Risk Assessment for It s Me 247. Online Banking

Student Accounts. Set-up Guidelines

Setting up your new login

KT-4 Keychain Token Welcome Guide

Password Manager for SAP Single Sign-On Implementation Guide

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Acrobat file of these slides and notes can be found at:

TWO-81 Main Info and Prep Use Job Aid

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

Guidance on how to register and add information about your resource to Dewis Cymru. Version: July 2017

Introduction to

GTL E-App. User Guide. Available on any device!

Security Awareness. Presented by OSU Institute of Technology

Password Managers: Devil s in the Details

Protecting and Archiving usernames & passwords

Welcome Guide for KT Series Token

Computer Security 3/20/18

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Frequently Asked Questions (FAQ)

Apple ID: ipad-setup phgs2017

CLIENT MANAGER PORTAL. A supplier s guide to the Supplier Finance website

Welcome Guide for MP-1 Token for Microsoft Windows

WebAdvisor Step by Step Registration Instructions for Students

COMING SOON. A new on-the-go banking experience. Important information about upcoming system upgrades at Bank Midwest happening April 24.

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

FREQUENTLY ASKED QUESTIONS

Updating Astea Mobile URLs

Student Service Centre Tel: (For all Finance related queries, Status of application and/or Registration queries)

Bits and Bytes August 2014

Student Accounts Setup Guideline

The State of Hacked Accounts

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

ivisions Employee Guide Portal Employee User Guide Town of Needham Terry Wolfson Created: 1/27/2014 Updated: 10/5/2016

Controlling Website Account Information. A recent survey done by Privacy Rights Clearinghouse shows that in the past five years

Going Mobile at Northwestern

Modern two-factor authentication: Easy. Affordable. Secure.

NetTeller Online Banking. Archdiocese of Chicago Parish Operations Archdiocesan Bank

Troubleshooting. EAP-FAST Error Messages CHAPTER

Transcription:

Production Passwords Page 1 - Cyber Security Class Copyright 2016

Does It Matter? Is your email password the same as your Facebook password? Is that Good? Bad? Why? Page 2 - Cyber Security Class Copyright 2016

Protect Your Password Page 3 - Cyber Security Class Copyright 2016

What Should You Do? Same password everywhere? o PLEASE, NO!!! o If one is compromised, all are compromised o Different systems have different pw rules o Violates K-State policy about eid passwords Rely on your memory? o Value is inversely proportional to your age! o You ll often click on Forgot Your Password? links! Write em down? o Risky, but not out of the question if you keep the note in a safe place (NOT your desk pencil drawer) o Bigger issue is quantity of passwords you have to remember o Generally considered a bad idea Page 4 - Cyber Security Class Copyright 2016

Let your browser store them all? OK for some passwords, but not others Too risky for accounts with access to sensitive information Easy for someone to view the stored passwords, unless you Use Firefox and password-protect viewing stored passwords and don t forget THAT password! DON T do it with your eid password, financial accounts, anything with access to personal identity info (like SSN) Never do this on a shared, lab, or public computer IE stores browser ( AutoComplete ) passwords in Registry o Free tools readily available to recover them. o Delete in IE8 with Tools->Internet Options->General-> Browsing history->delete, check the Passwords box Firefox had built-in tool to view them and delete them (Tools->Options->Security->Saved Passwords); be sure to use a Master Password to protect the stored passwords Page 5 - Cyber Security Class Copyright 2016

Why passwords are important? They are the entry point to your o Email, Twitter, Facebook, Myspace Ha Ha Myspace o Online Banking o Amazon, ebay, and other sites where you spend $$$$ IT and other enterprise resources. They provide access to the VPN, e-mail servers, and the network. Misused or stolen passwords can give intruders access to your personal info. Page 6 - Cyber Security Class Copyright 2016

Internal password theft is easy Social engineering is one of the easiest ways for intruders to compromise networks and other organizational systems. Others can hear you give a password to someone you trust. Someone looking over your shoulder can discover a password. Don t keep a copy of your password in a desk drawer, on a monitor, or under a keyboard. Page 7 - Cyber Security Class Copyright 2016

Social Engineering Page 8 - Cyber Security Class Copyright 2016

Protect your password Your password is yours alone. Don t share it with anyone, including supervisors, personal assistants, or IT personnel. Never write down your password. o You wouldn t write your PIN number for your ATM card, would you? Do NOT: Say your password aloud. E-mail your password to a coworker. Offer anyone hints about what your password might be. Page 9 - Cyber Security Class Copyright 2016

Examples of bad passwords Sports teams or terms: LouvlleSlgr Number sequence: *12345* Letter string: AAAAAA Mixed-case sequence: ABcdEFgh Company name: AcmeIT Keyboard sequence: QwERty or ASdFgh Lets Look At Some Bad Passwords Page 10 - Cyber Security Class Copyright 2016

Create a strong password Are eight characters or longer Can t contain any part of a user s full name or username Don t use any term that could easily be guessed by someone who is familiar with you Should not include any personal information, e.g., the name of a spouse or a street address Should not contain personal identification numbers, including those on a license plate, your telephone number, birth date, or any part of your Social Security number. Contain characters from three of the four classes of characters Page 11 - Cyber Security Class Copyright 2016

The four character classes are: English uppercase letters (A, B, C). English lowercase letters (a, b, c). Arabic numerals (1, 2, 3). Special characters (!, *, $, or other punctuation symbols). Page 12 - Cyber Security Class Copyright 2016

xkcd.com xkcd 936 explained Page 13 - Cyber Security Class Copyright 2016

Same password for similar categories of accounts? Have at least four categories: o Financial o eid and other important K-State accts o Shopping accts that store your credit card info o Innocuous accts w/ no sensitive information #1 and #2 should be long, complex, and changed regularly #3 not as long, less complex, changed less often #4 can be short, simple, never changed Differing password rules may pose a challenge Page 14 - Cyber Security Class Copyright 2016

Here is What I DO Use A Strong Password o Longer than 8 Characters o Mix CAPITAL, lower, number characters Use Different Types Of Passwords For Deferent Situations o My Email Strongest o Banks / Credit Cards o School o Any Account that has a Credit card o Any Account that has my PayPal o Account I care about, but don t have $$ attached (facebook, Instagram, etc) o Account that are just because I had to sign up Page 15 - Cyber Security Class Copyright 2016

Here is What I DO Phrasewithafewwords1234$%#@+3letersofCONText Correctbatteryhorsestaple + Numbers + Characters + + ABCD Page 16 - Cyber Security Class Copyright 2016

Last Words A password is the key to your Online presence resources. A strong password can protect your personal account. Take strides to make strong passwords that are not obvious to someone familiar with you. Remember to change your password on a regular basis. Ellen s Password minder protector minder Page 17 - Cyber Security Class Copyright 2016

Passwords Page 18 - Cyber Security Class Copyright 2016