SlideShare a Scribd company logo
Online and Mobile Basic Security
NGETH Moses
ICT Project Coordinator
Community Legal Education Center
(CLEC)
“No place like 127.0.0.1”
• 2nd Step Verification and Set up
• Remote your smart phone
• Easy to set up “strong” passwords
not a long passwords
2nd Step Verification
(For Google user ONLY)
• Stronger security for your Google Account
• With 2-Step Verification, you’ll protect your
account with both your password and your
phone
Why you needs it
Why you needs it
How it works
How it works
How it protects you
How it protects you
How it protects you
How to set up 2nd step verification
Sup 2nd step verification
• Go to your Gmail account
Set up 2nd step verification
• Go to “Security Tap”
• Click on “Setup”
Set up 2nd step verification
• Click on “Start setup”
• Re-type your password
Set up 2nd step verification
• Type your phone number
• Note: you either choose Google to send “Text
message (SMS” or Call you “Voice Call”
Set up 2nd step verification
• Go to icon of you profile photo at the top right
side
Set up 2nd step verification
• Code was sent to your number.
• Fill in the 6 digits in a blank box
• Note: Mobile and Metfone doesn’t work well.
Set up 2nd step verification
• If you are setting up on somebody els’ computer,
please un-tick “Trust this computer”.
• Recommend to set up on your computer ONLY
• Click Next
Set up 2nd step verification
• Just to make sure you got the right phone number.
• Click Confirm to finish the setup
Set up 2nd step verification
• NOTE:
– After finish setup 2nd step verification, all your social media
that uses with this Gmail account will be sign out. It means
you can’t log in to those account with your current
password. It needs a one-time “App-specific passwords”.
(Explanation off slide presentation)
Remote your smart phone
1. First you need to make sure that you have turned it on, which you can do
by following this quick tutorial:
2. Go to the Google Setttings of your Android device.
3. Tap on Android Device Manager at the bottom of the list
4. Check the box for Remotely locate this device
5. Check box for remote lock and factory reset.
6. To the Settings of your phone.
7. Tap on Security and then Device administrator. Make sure the Android
Device Manager is ticked off there.
8. Now that you have done this, you can remotely lock and wipe your
device in case of theft or loss. To do this, go to the Device Manager
website.
9. The path to activate this feature might differ depending on your device,
but in general should be the same as it's a Google service and not one
from your phone's manufacturer.
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone (On Device)
Remote your smart phone (On Device)
Easy create “Strong Password” not
“Long Password”
“Strong Password” not “Long
Password”
It is important to use different types of characters when
choosing a password. This can be done in various ways:
• Varying capitalisation, such as: 'My naME is Not
MR. MarSter'
• Alternating numbers and letters, such as: 'a11 w0Rk
4nD N0 p14Y'
• Incorporating certain symbols, such as:
'c@t(heR1nthery3'
• Using multiple languages, such as: 'Let Them Eat 1e
gateaU au ch()colaT
“Strong Password” not “Long
Password”
• Passwords can also take advantage of more
traditional mnemonic devices, such as the use of
acronyms. This allows long phrases to be turned into
complex, seemingly-random words:
• 'To be or not to be? That is the question' becomes
'2Bon2B?TitQ’
• 'We hold these truths to be self-evident: that all men
are created equal' becomes 'WhtT2bs-e:taMac=’
• 'Are you happy today?' becomes 'rU:-)2d@y?'
“Strong Password” not “Long
Password”
• A little effort to make the password more complex
goes a very long way. Increasing the length of a
password even just by a few characters, or by adding
numbers or special characters, makes it much more
difficult to crack. For demonstrative purposes, the
table below shows how much longer it may take a
hacker to break a list of progressively more complex
passwords by trying different combinations of the
password one after another.
“Strong Password” not “Long
Password”

More Related Content

Similar to Basic mobile and internet security

Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
Amritansh Barnwal
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
Lookout
 
Email security
Email securityEmail security
Email security
sruthiKrishnaG
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
Sucuri
 
HUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User GuideHUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User Guide
manualsheet
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
NAWAZ KHAN
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
TechSoup
 
Speed dials
Speed dialsSpeed dials
Speed dials
STARSSIP LIMITED
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
Hai Nguyen
 
Cyber security
Cyber securityCyber security
Cyber security
Shikhil Sharma
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?
limitlessusa
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
Arijit Ghosh
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
Sanjana Hattotuwa
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
Independent Contractor
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
connectsafe
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptx
Roshni814224
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
Student
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLM
Jeremy Glover
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
Amir Ali Mokhberi
 
Set up a new enum with eskytel
Set up a new enum with eskytelSet up a new enum with eskytel
Set up a new enum with eskytel
STARSSIP LIMITED
 

Similar to Basic mobile and internet security (20)

Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Email security
Email securityEmail security
Email security
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
HUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User GuideHUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User Guide
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Speed dials
Speed dialsSpeed dials
Speed dials
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptx
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLM
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Set up a new enum with eskytel
Set up a new enum with eskytelSet up a new enum with eskytel
Set up a new enum with eskytel
 

Recently uploaded

Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 

Recently uploaded (20)

Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 

Basic mobile and internet security

  • 1. Online and Mobile Basic Security NGETH Moses ICT Project Coordinator Community Legal Education Center (CLEC)
  • 2. “No place like 127.0.0.1” • 2nd Step Verification and Set up • Remote your smart phone • Easy to set up “strong” passwords not a long passwords
  • 3. 2nd Step Verification (For Google user ONLY) • Stronger security for your Google Account • With 2-Step Verification, you’ll protect your account with both your password and your phone
  • 11. How to set up 2nd step verification
  • 12. Sup 2nd step verification • Go to your Gmail account
  • 13. Set up 2nd step verification • Go to “Security Tap” • Click on “Setup”
  • 14. Set up 2nd step verification • Click on “Start setup” • Re-type your password
  • 15. Set up 2nd step verification • Type your phone number • Note: you either choose Google to send “Text message (SMS” or Call you “Voice Call”
  • 16. Set up 2nd step verification • Go to icon of you profile photo at the top right side
  • 17. Set up 2nd step verification • Code was sent to your number. • Fill in the 6 digits in a blank box • Note: Mobile and Metfone doesn’t work well.
  • 18. Set up 2nd step verification • If you are setting up on somebody els’ computer, please un-tick “Trust this computer”. • Recommend to set up on your computer ONLY • Click Next
  • 19. Set up 2nd step verification • Just to make sure you got the right phone number. • Click Confirm to finish the setup
  • 20. Set up 2nd step verification • NOTE: – After finish setup 2nd step verification, all your social media that uses with this Gmail account will be sign out. It means you can’t log in to those account with your current password. It needs a one-time “App-specific passwords”. (Explanation off slide presentation)
  • 21. Remote your smart phone 1. First you need to make sure that you have turned it on, which you can do by following this quick tutorial: 2. Go to the Google Setttings of your Android device. 3. Tap on Android Device Manager at the bottom of the list 4. Check the box for Remotely locate this device 5. Check box for remote lock and factory reset. 6. To the Settings of your phone. 7. Tap on Security and then Device administrator. Make sure the Android Device Manager is ticked off there. 8. Now that you have done this, you can remotely lock and wipe your device in case of theft or loss. To do this, go to the Device Manager website. 9. The path to activate this feature might differ depending on your device, but in general should be the same as it's a Google service and not one from your phone's manufacturer.
  • 26. Remote your smart phone (On Device)
  • 27. Remote your smart phone (On Device)
  • 28. Easy create “Strong Password” not “Long Password”
  • 29. “Strong Password” not “Long Password” It is important to use different types of characters when choosing a password. This can be done in various ways: • Varying capitalisation, such as: 'My naME is Not MR. MarSter' • Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y' • Incorporating certain symbols, such as: 'c@t(heR1nthery3' • Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT
  • 30. “Strong Password” not “Long Password” • Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words: • 'To be or not to be? That is the question' becomes '2Bon2B?TitQ’ • 'We hold these truths to be self-evident: that all men are created equal' becomes 'WhtT2bs-e:taMac=’ • 'Are you happy today?' becomes 'rU:-)2d@y?'
  • 31. “Strong Password” not “Long Password” • A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another.
  • 32. “Strong Password” not “Long Password”