Computer Security:Passwords- Is yours a good one? By: Mike Barker
Preface <ul><li>With the growth of the Internet, computer and network security has become more important than ever. </li><...
Preface <ul><li>That description is not entirely accurate </li></ul><ul><li>Within the subculture of computer hobbyists an...
Hacker versus Cracker <ul><li>In short, a hacker is someone who programs creatively and usually for pure amusement. </li><...
Hacker versus Cracker <ul><li>In some cases, the damage may be as little as an altered Web page, the Internet equivalent o...
Password Protection <ul><li>Password are the most fundamental security tool of any modern operating system and, consequent...
Password Protection <ul><li>Here are some things to avoid when choosing a password: </li></ul><ul><ul><li>Do not use any v...
Password Protection <ul><li>Here are … </li></ul><ul><ul><li>Do not use proper names of any kind </li></ul></ul><ul><ul><l...
Choosing good password <ul><li>A good way to choose a strong password is to take the first letter from each word of an eas...
Choosing good password <ul><li>Ideas for good password </li></ul><ul><ul><li>Mrci7yo! : My rusty car is 7 years old! </li>...
Changing password periodically <ul><li>Even really good passwords can be broken if a cracker has enough time to work at it...
THANK YOU <ul><li>Any Questions? </li></ul><ul><li>References- Wikepedia.com </li></ul><ul><li>Personal Experiences </li><...
Upcoming SlideShare
Loading in …5
×

Computer Privacy:Passwords-Mike B.

463 views

Published on

My class assignment on Computer Privacy

Published in: Technology
  • Be the first to comment

Computer Privacy:Passwords-Mike B.

  1. 1. Computer Security:Passwords- Is yours a good one? By: Mike Barker
  2. 2. Preface <ul><li>With the growth of the Internet, computer and network security has become more important than ever. </li></ul><ul><li>Increasingly, we hear of malicious individuals breaking into corporate and government computer systems around the world </li></ul><ul><li>The media calls these people hackers </li></ul>
  3. 3. Preface <ul><li>That description is not entirely accurate </li></ul><ul><li>Within the subculture of computer hobbyists and software enthusiasts, the term hacker usually refers to a particular kind of programmer </li></ul><ul><li>A cracker, on the other hand, is someone who breaks into computers, often to do something malicious </li></ul>
  4. 4. Hacker versus Cracker <ul><li>In short, a hacker is someone who programs creatively and usually for pure amusement. </li></ul><ul><li>The correct term for someone who breaks into computer systems is a cracker </li></ul>
  5. 5. Hacker versus Cracker <ul><li>In some cases, the damage may be as little as an altered Web page, the Internet equivalent of graffiti </li></ul><ul><li>In other cases, the cracker may wipe out your entire hard drive to cover his or her tracks </li></ul><ul><li>Fortunately, there are ways to protect yourself. </li></ul>
  6. 6. Password Protection <ul><li>Password are the most fundamental security tool of any modern operating system and, consequently, the most commonly attacked security feature </li></ul><ul><li>It is natural to want to choose a password that is easy to remember, but very often this means choosing a password that is also easy to guess </li></ul><ul><li>Crackers know that on any system with more than a few users, at least one person is likely to have an easily guessed password </li></ul>
  7. 7. Password Protection <ul><li>Here are some things to avoid when choosing a password: </li></ul><ul><ul><li>Do not use any variation of your login name or your full name. Even if you use varied case, append or prepend numbers or punctuation, or type it backwards, this will still be an easily guessed password </li></ul></ul><ul><ul><li>Do not use a dictionary word, even if you add numbers or punctuation to it </li></ul></ul>
  8. 8. Password Protection <ul><li>Here are … </li></ul><ul><ul><li>Do not use proper names of any kind </li></ul></ul><ul><ul><li>Do not use any contiguous line of letters or numbers on the keyboard (such as “qwerty” or “asdfg”) </li></ul></ul>
  9. 9. Choosing good password <ul><li>A good way to choose a strong password is to take the first letter from each word of an easily remembered sentence </li></ul><ul><li>The password can be made even better by adding numbers, punctuation, and varied case </li></ul><ul><li>The sentence you choose should have meaning only to you, and should not be publicly available (choosing a sentence on your personal Web page is a bad idea) </li></ul>
  10. 10. Choosing good password <ul><li>Ideas for good password </li></ul><ul><ul><li>Mrci7yo! : My rusty car is 7 years old! </li></ul></ul><ul><ul><li>2emBplib : 2 elephants make BAD pets, 1 is better </li></ul></ul><ul><ul><li>ItMc?Gib : Is that My coat? Give it back </li></ul></ul><ul><li>As you can see, I even placed emphasis on particular words and used that to remember capitalization of certain letters </li></ul><ul><li>The password look like gibberish, but are actually rather easy to remember </li></ul>
  11. 11. Changing password periodically <ul><li>Even really good passwords can be broken if a cracker has enough time to work at it </li></ul><ul><li>That is why periodically changing your password is an extremely good idea </li></ul><ul><li>This way, by the time a cracker does arrive at the correct password, it will already be changed to something different </li></ul>
  12. 12. THANK YOU <ul><li>Any Questions? </li></ul><ul><li>References- Wikepedia.com </li></ul><ul><li>Personal Experiences </li></ul>

×