Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Password Managers and 2 Factor Authentication


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

Password Managers and 2 Factor Authentication

  1. 1. Password Management and 2 Factor Authentication Because post-its on your desk aren’t enough
  2. 2. Passwords vs Passphrase
  3. 3. Go to a website to check it out• hp
  4. 4. More than just entropy• Entropy – 25-GPU cluster cracks every standard Windows password in <6 hours • cluster-cracks-every-standard-windows-password-in- 6-hours/• Not Entropy (Rainbow Tables) – The multi-platform password cracker Ophcrack is incredibly fast. How fast? It can crack the password "Fgpyyih804423" in 160 seconds. – cracking.html
  5. 5. But, you need a separate one for every website so …• You could try an algorithm – Here is one example: The first digit is the number of characters on the name of the website. The second digit is “c” is the number in the first step was odd, and “t” if it was even. The third digit is the last letter of the name of the website. The fourth digit is “$” if the letter in the previous step was a vowel, and “%” if it was a consonant. The last three digits are the first three letters of the name of the website. Using the algorithm above, your password on Twitter would be “7cr%twi” and on Facebook it would be “8tk%fac”. online-passwords-and-never-forget-one-again/
  6. 6. Sane Answer: Password Managers• Keepass• LastPass• Either better than letting your browser remember it. – Encrypted – Usable across platforms
  7. 7. When They Fail• Password Managers are not perfect• Learn to use them• Have a backup plan
  8. 8. 2 Factor Authentication– Two-factor authentication is often confused with other forms of authentication. Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. These factors are: • Something the user knows (e.g., password, PIN, pattern); • Something the user has (e.g., ATM card, smart card); and • Something the user is (e.g., biometric characteristic, such as a fingerprint).
  9. 9. Examples• You use it already – Conference Room• Online version – Google best example – py?hl=en&answer=180744
  10. 10. Why use it• Gives you better protection against online identity theft.• It’s easy.• May someday be required.
  11. 11. The Future• Physical Tokens – How it works – With a simple touch of the gold disc, the YubiKey sends a One Time Password (OTP) as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey compliant application.
  12. 12. It’s small
  13. 13. Resources– choose-and-remember-great-passwords– weak-passwords– manager-is-the-most-secure– factor_authentication