Your SlideShare is downloading. ×
Password Managers and 2 Factor Authentication
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Password Managers and 2 Factor Authentication


Published on

Published in: Education

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Password Management and 2 Factor Authentication Because post-its on your desk aren’t enough
  • 2. Passwords vs Passphrase
  • 3. Go to a website to check it out• hp
  • 4. More than just entropy• Entropy – 25-GPU cluster cracks every standard Windows password in <6 hours • cluster-cracks-every-standard-windows-password-in- 6-hours/• Not Entropy (Rainbow Tables) – The multi-platform password cracker Ophcrack is incredibly fast. How fast? It can crack the password "Fgpyyih804423" in 160 seconds. – cracking.html
  • 5. But, you need a separate one for every website so …• You could try an algorithm – Here is one example: The first digit is the number of characters on the name of the website. The second digit is “c” is the number in the first step was odd, and “t” if it was even. The third digit is the last letter of the name of the website. The fourth digit is “$” if the letter in the previous step was a vowel, and “%” if it was a consonant. The last three digits are the first three letters of the name of the website. Using the algorithm above, your password on Twitter would be “7cr%twi” and on Facebook it would be “8tk%fac”. online-passwords-and-never-forget-one-again/
  • 6. Sane Answer: Password Managers• Keepass• LastPass• Either better than letting your browser remember it. – Encrypted – Usable across platforms
  • 7. When They Fail• Password Managers are not perfect• Learn to use them• Have a backup plan
  • 8. 2 Factor Authentication– Two-factor authentication is often confused with other forms of authentication. Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. These factors are: • Something the user knows (e.g., password, PIN, pattern); • Something the user has (e.g., ATM card, smart card); and • Something the user is (e.g., biometric characteristic, such as a fingerprint).
  • 9. Examples• You use it already – Conference Room• Online version – Google best example – py?hl=en&answer=180744
  • 10. Why use it• Gives you better protection against online identity theft.• It’s easy.• May someday be required.
  • 11. The Future• Physical Tokens – How it works – With a simple touch of the gold disc, the YubiKey sends a One Time Password (OTP) as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey compliant application.
  • 12. It’s small
  • 13. Resources– choose-and-remember-great-passwords– weak-passwords– manager-is-the-most-secure– factor_authentication