Information Security

302 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
302
On SlideShare
0
From Embeds
0
Number of Embeds
27
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Password cracking software uses one of three approaches: intelligent guessing, dictionary attacks, and automation that tries every possible combination of characters. Given enough time, the automated method can crack any password. However, it still can take months to crack a strong password.
  • Information Security

    1. 1. INTERNETSECURITYHakan Islamoglu
    2. 2. WHAT ARE THE BASIC PRECAUTIONS? Always update operating system and other software files Get an Anti-virus suite Create strong passwords
    3. 3. KEEP THEM UPDATEDA small coder mistake may causedisastersSoftware Updates generallyprovide• Security fixes• Performance improvements• Compatibility fixes• New functions
    4. 4. ANTI-VIRUS SOFTWARES Cyber bodyguards Commercial or free ? Be on the lookout for FAKES *http://www.microsoft.com/windows/antivirus-partners/
    5. 5. A STRONG PASSWORDS  Contains 8 or more characters  Includes different character types such as  Letters (both UPPERCASE and lowercase)  Numerals (0, 1, 2, 3, 4, 5, 6, 7, 8, 9)  Symbols (all characters not defined as letters or numerals) ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] : " ;<>?,./  Is written only on your mind, not on anywhere else  Is significantly different from prior passwords.  Does NOT include personal information, user name, dictionary words, common abbreviations etc.
    6. 6. WHAT IS THE RISK? Sales To make loans such 4% as a car and real estate to access bank 19% accounts to access telephone accounts to access insurance 10% accounts 60% to access internet accounts 2% 4% other 1%
    7. 7. CHOICE IS YOURSDo you think these measurements are time-consuming?Think of the things you may loseIs it worth the risk ?
    8. 8. THANK YOU FOR LISTENING

    ×