SlideShare a Scribd company logo
What’s your Password ???
Top passwords of all times… 123456, password, 12345678, lifehack, qwerty, abc123, 111111, monkey, consumer, 12345, 696969, letmein, trustno1,god,love.  It has been reported that almost 188,279 passwords were leaked, out of which it was discovered that more than 3,000 users chose "123456" as their login password, making the password top the list of most common passwords. Moreover, nearly 2,000 people chose "password" as their protective word and over 1,000 people decided that "12345678" is an appropriate security choice for them.
Other smart guesses would be… Your parents/partners, child, or pet's name, possibly followed by a 0,1. Digits from your phone number, vehicle etc. Your city, or college, favourite  team name. Date of birth – yours, your partner's or your child's.
Breaches in your Personal Security Using same password for most stuff. Bank websites are mostly quite secure, but most forums, online greeting cards etc. aren't prepared for an attack. So, all we have to do now is unleash Brutus, or any other password cracker on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible. Once we've got several login + password pairings we can then go back and test them on targeted sites. But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache.
Other places a hacker can trace your activity  Temporary Internet files, Web site cookies, browser history, and index.dat Typed URL history Saved passwords and form auto-complete information stored in your browser Recent Documents Usage history of: Start/Run, Search Temporary directories on the hard drive Items contained within the Windows Registry Deleted items contents Media player history Using CCleaner or Privacy Eraser.
Must be at least 8 characters long. Never use same passwords for all accounts, rather have a general rule set of generating “unique” passwords. For example, have a base password and then use 1st two consonants and then 1st two vowels of your service provider. Say, base password = uiop For yahoo it’d be uiopyhao You can add numbers and special characters too for enhancing password, like uiOp#01yhao . Guide to choosing Secure Passwords.
Initials of your favorite song or movie, say Pirates of the Caribbean = PotC. Use a pre-established keyboard pattern, like "yui" or "zxcv." Just look at your keyboard to remember it. For extra security, choose an easy to remember base, like "cat" and then shift your fingers up one row on the keyboard when you type it. In the case of "cat," you'd get "dq5." Selecting a base Password
What if One-rule set is compromised ? One can use basic cryptography, as in replace ‘I’ by 1 or !, ‘a’ by @,’o’ by 0,’s’ by $ or &,’e’ by 3 and lots more… Randomly throw in capital letters. Using password managers, they generate errand string from your simple passwords, like “GMLT10AMA” is “1341b4ea8919” and need a master password. Also these passwords are almost irreversible ! But it comes back to squaring one, it all depends how strong is your master password. Always check strength of your passwords, here’s a website : www.passwordmeter.com

More Related Content

Similar to D-Cipher 1.0 (Strong Passwords)

Password management for you
Password management for youPassword management for you
Password management for you
Chit Ko Ko Win
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
nFront Security
 
‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016 ‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016
niraj joshi
 
Password Management
Password ManagementPassword Management
Password Management
Davon Smart
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
William Mann
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
Harrison Kenyon Marketing
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
Yury Chemerkin
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
Molly Immendorf
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
selcukca84
 
Greater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityGreater Wheeling AITP Web Security
Greater Wheeling AITP Web Security
John Parkinson
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
Data Hops
 
Securing password
Securing passwordSecuring password
Securing password
splendorcollege
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
Rare Input
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
University of Hertfordshire
 
Secure passwords
Secure passwordsSecure passwords
Secure passwords
srushtikadu1
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
 

Similar to D-Cipher 1.0 (Strong Passwords) (20)

Password management for you
Password management for youPassword management for you
Password management for you
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016 ‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016
 
Identity
IdentityIdentity
Identity
 
Password Management
Password ManagementPassword Management
Password Management
 
Password management
Password managementPassword management
Password management
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
Greater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityGreater Wheeling AITP Web Security
Greater Wheeling AITP Web Security
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
 
Securing password
Securing passwordSecuring password
Securing password
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
 
Secure passwords
Secure passwordsSecure passwords
Secure passwords
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 

Recently uploaded

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 

Recently uploaded (20)

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 

D-Cipher 1.0 (Strong Passwords)

  • 2.
  • 3. Top passwords of all times… 123456, password, 12345678, lifehack, qwerty, abc123, 111111, monkey, consumer, 12345, 696969, letmein, trustno1,god,love. It has been reported that almost 188,279 passwords were leaked, out of which it was discovered that more than 3,000 users chose "123456" as their login password, making the password top the list of most common passwords. Moreover, nearly 2,000 people chose "password" as their protective word and over 1,000 people decided that "12345678" is an appropriate security choice for them.
  • 4. Other smart guesses would be… Your parents/partners, child, or pet's name, possibly followed by a 0,1. Digits from your phone number, vehicle etc. Your city, or college, favourite team name. Date of birth – yours, your partner's or your child's.
  • 5. Breaches in your Personal Security Using same password for most stuff. Bank websites are mostly quite secure, but most forums, online greeting cards etc. aren't prepared for an attack. So, all we have to do now is unleash Brutus, or any other password cracker on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible. Once we've got several login + password pairings we can then go back and test them on targeted sites. But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache.
  • 6.
  • 7.
  • 8. Other places a hacker can trace your activity Temporary Internet files, Web site cookies, browser history, and index.dat Typed URL history Saved passwords and form auto-complete information stored in your browser Recent Documents Usage history of: Start/Run, Search Temporary directories on the hard drive Items contained within the Windows Registry Deleted items contents Media player history Using CCleaner or Privacy Eraser.
  • 9. Must be at least 8 characters long. Never use same passwords for all accounts, rather have a general rule set of generating “unique” passwords. For example, have a base password and then use 1st two consonants and then 1st two vowels of your service provider. Say, base password = uiop For yahoo it’d be uiopyhao You can add numbers and special characters too for enhancing password, like uiOp#01yhao . Guide to choosing Secure Passwords.
  • 10. Initials of your favorite song or movie, say Pirates of the Caribbean = PotC. Use a pre-established keyboard pattern, like "yui" or "zxcv." Just look at your keyboard to remember it. For extra security, choose an easy to remember base, like "cat" and then shift your fingers up one row on the keyboard when you type it. In the case of "cat," you'd get "dq5." Selecting a base Password
  • 11. What if One-rule set is compromised ? One can use basic cryptography, as in replace ‘I’ by 1 or !, ‘a’ by @,’o’ by 0,’s’ by $ or &,’e’ by 3 and lots more… Randomly throw in capital letters. Using password managers, they generate errand string from your simple passwords, like “GMLT10AMA” is “1341b4ea8919” and need a master password. Also these passwords are almost irreversible ! But it comes back to squaring one, it all depends how strong is your master password. Always check strength of your passwords, here’s a website : www.passwordmeter.com