SlideShare a Scribd company logo
1 of 19
Passwords Overview
 Why need passwords
 Weak passwords
 Strong passwords
 Commonly used passwords
Why We Need Passwords?
 Password is a secret word or code used to serve as a security
measure against unauthorized access to data
 Why we need?
 To protect your valuable or personal information on your
computer
 To protect your email read by some one else
 To protect your network
 To protect your Website
 To protect your online banking
Weak Passwords
 A password that is easy to detect both by humans and by
computer is a weak password
 Short password can be quickly hacked
 Whole dictionary or half dictionary words are easily hacked by
dictionary attack
 Reusing old passwords increase the likelihood that your account
might be hacked
 Because if someone had one of your old passwords and you've
cycled back to using that password then your account may
become compromised
Weak Passwords
Dictionary Attack
 A dictionary attack is a method of breaking into a password-
protected computer or server by systematically entering every
word in a dictionary as a password
 A dictionary attack can also be used in an attempt to find the key
necessary to decrypt an encrypted message or document
 Dictionary attacks try which are derived from a dictionary such as
many users use ordinary words as passwords and such words are
easily guessable and hack
 Like, iloveyou,12345,54321,ilovemom,ILOVEYOU...
Dictionary Attack
Brute Force Attack
 Brute force is a trial and error method used by application programs
to decode encrypted data such as passwords or Data Encryption
Standard (DES) keys
 Just as a criminal might break into, or "crack" a safe by trying many
possible combinations, a brute force cracking application proceeds
through all possible combinations of legal characters in sequence
 Like hello, HELLO, Eello, keLLO, FELlo,…
List of Weak Passwords
1. Your partner, child, or pet's name, possibly followed by a 0 or 1
2. The last 4 digits of your social security number.
3. 123 or 1234 or 123456.
4. password
5. Your city, or college, football team name.
6. Date of birth – yours, your partner's or your child's.
7. money
8. love
Why create a strong Password?
 Passwords provide the first line of defense against unauthorized
access to your computer
 The stronger your password, the more protected your computer
will be from hackers and malicious software
 You should make sure you have strong passwords for all accounts
on your computer
 If you're using a corporate network, your network administrator
might require you to use a strong password
A strong Password
 Is at least eight characters long
 Does not contain your user name, real name, or company name
 Does not contain a complete word
 Is significantly different from previous password
A strong Password…
 Contains each of the following characters:
 Uppercase letters like, A, B,C
 Lowercase letters like, a,b,c
 Numbers like, 1,2,3,4,5,6,7,8,9
 Symbols found on the keyboard
 ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ]  | : ; " ' < > , . ? /
Choosing A strong Password
Some Tips
 A password might meet all the criteria above and still be a
weak password
 For example, Hello2U!
 It meets all the criteria for a strong password listed
above, but is still weak because it contains a complete
word
 H3ll0 2 U! is a stronger alternative because it replaces
some of the letters in the complete word with numbers
and also includes spaces
Tips to remember strong Password
 Create an acronym from an easy-to-remember piece of
information
 Pick a phrase that is meaningful to you, such as My son's birthday
is 12 December, 2004
 Using that phrase as your guide, you might use Msbi12/Dec,4 for
your password.
 Substitute numbers, symbols, and misspellings for letters or
words in an easy-to-remember phrase
 For example, My son's birthday is 12 December, 2004 could
become Mi$un's Brthd8iz 12124
Tips to remember…
 Relate your password to a favorite hobby or sport
 For example, I love to play badminton could become
ILuv2PlayB@dm1nt()n
 Also, If you feel you must write down your password in order to
remember it
 Make sure you don't label it as your password, and keep it in a
safe place
Tips to remember…
Questions?
Thank You
References
 http://searchsecurity.techtarget.com/definition/dictionary-attack
 http://netsecurity.about.com/od/advancedsecurity/fl/What-Makes-a-Password-
Weak-or-Strong.htm
 http://lifehacker.com/5505400/how-id-hack-your-weak-passwords
 http://windows.microsoft.com/en-US/windows-vista/Tips-for-creating-a-strong-
password
 http://www.answers.com/Q/What_are_the_differences_between_Dictionary_Atta
ck_Brute_Force_Attack_and_Hybrid_Attack
 http://www.thehackerstore.net/2012/08/what-is-difference-between-brute-
force.html
 https://images.search.yahoo.com/yhs/search;_ylt=A0LEV738v.BVKEYAsREnnIlQ;_yl
u=X3oDMTEzajBwdGlxBGNvbG8DYmYxBHBvcwMxBHZ0aWQDRkZSQTAxXzEEc2VjA3Nj
?p=Strong+Password&fr=yhs-mozilla-003&hspart=mozilla&hsimp=yhs-003

More Related Content

Recently uploaded

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Recently uploaded (20)

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Passwords Overview

  • 1. Passwords Overview  Why need passwords  Weak passwords  Strong passwords  Commonly used passwords
  • 2. Why We Need Passwords?  Password is a secret word or code used to serve as a security measure against unauthorized access to data  Why we need?  To protect your valuable or personal information on your computer  To protect your email read by some one else  To protect your network  To protect your Website  To protect your online banking
  • 3. Weak Passwords  A password that is easy to detect both by humans and by computer is a weak password  Short password can be quickly hacked  Whole dictionary or half dictionary words are easily hacked by dictionary attack  Reusing old passwords increase the likelihood that your account might be hacked  Because if someone had one of your old passwords and you've cycled back to using that password then your account may become compromised
  • 5. Dictionary Attack  A dictionary attack is a method of breaking into a password- protected computer or server by systematically entering every word in a dictionary as a password  A dictionary attack can also be used in an attempt to find the key necessary to decrypt an encrypted message or document  Dictionary attacks try which are derived from a dictionary such as many users use ordinary words as passwords and such words are easily guessable and hack  Like, iloveyou,12345,54321,ilovemom,ILOVEYOU...
  • 7. Brute Force Attack  Brute force is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys  Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence  Like hello, HELLO, Eello, keLLO, FELlo,…
  • 8. List of Weak Passwords 1. Your partner, child, or pet's name, possibly followed by a 0 or 1 2. The last 4 digits of your social security number. 3. 123 or 1234 or 123456. 4. password 5. Your city, or college, football team name. 6. Date of birth – yours, your partner's or your child's. 7. money 8. love
  • 9. Why create a strong Password?  Passwords provide the first line of defense against unauthorized access to your computer  The stronger your password, the more protected your computer will be from hackers and malicious software  You should make sure you have strong passwords for all accounts on your computer  If you're using a corporate network, your network administrator might require you to use a strong password
  • 10. A strong Password  Is at least eight characters long  Does not contain your user name, real name, or company name  Does not contain a complete word  Is significantly different from previous password
  • 11. A strong Password…  Contains each of the following characters:  Uppercase letters like, A, B,C  Lowercase letters like, a,b,c  Numbers like, 1,2,3,4,5,6,7,8,9  Symbols found on the keyboard  ` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] | : ; " ' < > , . ? /
  • 12. Choosing A strong Password
  • 13. Some Tips  A password might meet all the criteria above and still be a weak password  For example, Hello2U!  It meets all the criteria for a strong password listed above, but is still weak because it contains a complete word  H3ll0 2 U! is a stronger alternative because it replaces some of the letters in the complete word with numbers and also includes spaces
  • 14. Tips to remember strong Password  Create an acronym from an easy-to-remember piece of information  Pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004  Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.  Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase  For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124
  • 15. Tips to remember…  Relate your password to a favorite hobby or sport  For example, I love to play badminton could become ILuv2PlayB@dm1nt()n  Also, If you feel you must write down your password in order to remember it  Make sure you don't label it as your password, and keep it in a safe place
  • 19. References  http://searchsecurity.techtarget.com/definition/dictionary-attack  http://netsecurity.about.com/od/advancedsecurity/fl/What-Makes-a-Password- Weak-or-Strong.htm  http://lifehacker.com/5505400/how-id-hack-your-weak-passwords  http://windows.microsoft.com/en-US/windows-vista/Tips-for-creating-a-strong- password  http://www.answers.com/Q/What_are_the_differences_between_Dictionary_Atta ck_Brute_Force_Attack_and_Hybrid_Attack  http://www.thehackerstore.net/2012/08/what-is-difference-between-brute- force.html  https://images.search.yahoo.com/yhs/search;_ylt=A0LEV738v.BVKEYAsREnnIlQ;_yl u=X3oDMTEzajBwdGlxBGNvbG8DYmYxBHBvcwMxBHZ0aWQDRkZSQTAxXzEEc2VjA3Nj ?p=Strong+Password&fr=yhs-mozilla-003&hspart=mozilla&hsimp=yhs-003