Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Password Management

1,484 views

Published on

Powerpoint I had done for an old class.

Published in: Technology, Business

Password Management

  1. 1. Password Management By, Davon Smart
  2. 2. Password Management <ul><li>Why is it important? </li></ul><ul><ul><li>Apart of our everyday lives </li></ul></ul><ul><ul><li>The information it protects </li></ul></ul>
  3. 3. Password Management <ul><li>Issues with password management? </li></ul><ul><ul><li>Difficult to remember: </li></ul></ul><ul><ul><ul><li>Complicated passwords. </li></ul></ul></ul><ul><ul><ul><li>Many different passwords. </li></ul></ul></ul><ul><ul><ul><li>Passwords that change frequently. </li></ul></ul></ul><ul><ul><ul><li>Passwords for systems that are used infrequently. </li></ul></ul></ul>
  4. 4. Password Management <ul><li>What are some organization’s issues? </li></ul><ul><ul><li>The servers that house passwords may be compromised, and their passwords acquired by an intruder. </li></ul></ul><ul><ul><li>The help desk may be tricked into giving an intruder a valid password. </li></ul></ul>
  5. 5. Password Management <ul><li>More Organization issues… </li></ul><ul><ul><li>The networks that passwords travel between a user's workstation and servers that the user logs into may be compromised, and passwords may be recorded by an intruder during transmission. </li></ul></ul><ul><ul><li>Users may be tricked into providing their passwords to intruders via a social engineering effort. </li></ul></ul>
  6. 6. Password Management <ul><li>How one issue can lead to another? </li></ul><ul><ul><li>Write down their passwords </li></ul></ul><ul><ul><li>Forget their passwords </li></ul></ul><ul><ul><li>Use very simple, easily compromised passwords. </li></ul></ul><ul><ul><li>Reuse old passwords as often as possible. </li></ul></ul>
  7. 7. Password Management <ul><li>How can you protect passwords? </li></ul><ul><ul><li>Should be at least seven characters long. </li></ul></ul><ul><ul><li>Should contain at least one letter, and at least one digit. </li></ul></ul><ul><ul><li>Should contain both uppercase and lowercase letters, and at least one &quot;special&quot; character. </li></ul></ul>
  8. 8. Password Management <ul><li>Some NO’s for passwords choices are: </li></ul><ul><ul><li>Passwords must not be based on the user's name or login ID. </li></ul></ul><ul><ul><li>Passwords must not be based on a dictionary word, in any language. </li></ul></ul><ul><ul><li>Passwords may not contain more than two paired letters. </li></ul></ul>
  9. 9. Password Management <ul><li>You're doing a little Web browsing at work when you come upon Widgetsnmore.com, a site that looks vaguely familiar. Suddenly, you see it: the multipurpose electronic gadget polisher you've coveted for weeks--and it's half price until 5 o'clock today! You click on the image to order it, and...uh-oh. The site asks for your password. What do you do? </li></ul>
  10. 10. Password Management <ul><li>Enter your cat's name--you use the same simple password at every site. </li></ul><ul><li>Frantically type word-and-number combinations you've used in the past. </li></ul><ul><li>Set up a brand-new account. </li></ul><ul><li>Give up, exit your browser, and learn to love your dull, unpolished gadgets. </li></ul><ul><li>Confidently enter drk#3kl8nfl and complete the transaction. </li></ul>
  11. 11. Password Management <ul><li>If you chose e , congratulations. You obviously have an advanced degree in password management. </li></ul>
  12. 12. Password Management <ul><li>Some examples…… </li></ul>
  13. 13. Password Management <ul><li>Horizon Blue Cross Blue Shield </li></ul><ul><ul><li>Video </li></ul></ul>
  14. 14. Password Management <ul><li>What security measures does Horizon BCBSNJ take with confidential information? </li></ul><ul><li>Horizon BCBSNJ has password protected all personal information on their laptop computers. All confidential information is also encrypted. </li></ul>
  15. 15. Password Management <ul><li>What is Horizon BCBSNJ doing to assist affected members? </li></ul><ul><li>one year of free credit monitoring service through ConsumerInfo.com </li></ul>
  16. 16. Password Management <ul><li>Second Life security breach </li></ul><ul><ul><li>650,000 users </li></ul></ul><ul><ul><ul><li>Names </li></ul></ul></ul><ul><ul><ul><li>Addresses </li></ul></ul></ul><ul><ul><ul><li>Passwords </li></ul></ul></ul><ul><ul><ul><li>Credit card information </li></ul></ul></ul>
  17. 17. Password Management <ul><li>Hacker penetrates T-Mobile Systems </li></ul><ul><ul><li>Access for a year </li></ul></ul><ul><ul><ul><li>Secret service emails </li></ul></ul></ul><ul><ul><ul><li>Customer’s passwords </li></ul></ul></ul><ul><ul><ul><li>Social security numbers </li></ul></ul></ul><ul><ul><ul><li>Birth dates </li></ul></ul></ul><ul><ul><ul><li>Photos taken by sidekick users </li></ul></ul></ul><ul><ul><ul><ul><li>Celebrities </li></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Vida Guerra (possibly) </li></ul></ul></ul></ul></ul>

×