SlideShare a Scribd company logo
1 of 37
PREPARE FOR PRACTICE
Don't Forget Your (Virtual) Keys: Creating
and Using Strong Passwords
Source: http://www.informationisbeautiful.net/visualizations/
worlds-biggest-data-breaches-hacks/
Source: http://insecpro.com/index.php/articles/main-cyber-crime-statistics
TODAY’S AGENDA
• Creating strong passwords
• Monitoring your passwords
• Remembering your passwords
• Recovering from a stolen password
• More information
ARE YOU USING STRONG
PASSWORDS?
• How secure is my password? (sponsored by Dashlane)
• The Password Meter
AVOID BAD PASSWORDS
Source: https://www.teamsid.com/worst-passwords-2016/
THINK BIG!
SOME TIPS:
Do
• Start with:
• Sentence (abbreviated)
• Passphrase
• Misspelled longer words
• Unrelated words string
• Add upper and lower case
• Add some numbers
• Add some symbols
Don’t
• Repeat part of your user
name
• Use something others know
about You
• Use real words only
• Only replace letters with
symbols to make common
words more “secure”
• Write down your passwords
(use a password manager)
EXAMPLES
Starting Points
• Abbreviated sentence:
• The first President was George Washington  TfPwGeoWash
• Passphrase:
• President Barack Obama attended Columbia and Harvard Law

• BarackObamaColumbiaHarvardLaw
EXAMPLES
Starting Points (cont’d)
• Misspelled Words:
• crustacean exoskeleton  crostescien eksoschelatun
• Unrelated words string:
• Newporthippogreenpopcorn
EXAMPLES (CONT’D)
Add: Upper and Lower Case
• TfPwGeoWash  TfPwGeOWasH
• BarackObamaColumbiaHarvardLaw 
BaracKObamAColumbiAHarvarDLaw
• crostescien eksoschelatun  CrosTeScienEksoScheLaTun
• Newporthippogreenpopcorn  NewPortHipPoGrEenPopCorn
EXAMPLES (CONT’D)
Add: Numbers & Symbols
• TfPwGeOWasH  17TfPwGeOWasH99  17TfPwG$OW@sH99*
• BaracKObamAColumbiAHarvarDLaw 
61BaracKObamA83ColumbiA91HarvarDLaw
61B@racKOb@mA83Co!umbiA91H@rvarDLaw# 
• CrosTeScienEksoScheLaTun  Cr0sT3ScienEks0Sch3LaTun 
Cr0sT3Sc!enEks0Sch3L@Tun
• N3wP8r+H!pP0GrE#nP@pCorn
Learn More: See Resources: Creating Strong Passwords on the class page for more
ideas on creating strong passwords.
AVOID USING THE SAME
PASSWORD REPEATEDLY
CHANGE YOUR PASSWORDS
OFTEN
USE A PASSWORD MANAGER
See: Use a Password Manager on the class page for links to these products.
PASSWORD MANAGER KEY FEATURES
• Operating systems
• Browser integration/Form Filling
• Mobile Platforms
• Secure sharing
• Password generation
• Price: Free, Freemium, Paid, Educational discounts
• BONUS! Security Alerts
• BONUS! Two factor authentication
“Lastpass, a company that offers users a
way to centrally manage all of their
passwords online with a single master
password, disclosed Monday that intruders
had broken into its databases and made off
with user email addresses and password
reminders, among other data.” – Posted
June 16, 2015
Source: http://krebsonsecurity.com/2015/06/password-manager-lastpass-warns-
of-breach/
BUT KEEP IN MIND…
HOW ELSE CAN YOU PROTECT
YOURSELF?
• Don’t share passwords with anyone!
• Don’t reuse passwords on important sites.
• If you do share a password, share WISELY via email.
• Monitor your email addresses.
• Use multi-factor authentication, when available.
• Add password recovery features to your accounts.
MONITOR YOUR EMAIL
• BreachAlarm
• ‘;--have I been pwned
USE MULTI-FACTOR
AUTHENTICATION WHEN AVAILABLE
FACTOR: WHAT YOU KNOW
What is your
mother’s maiden
name?
FACTOR: WHAT YOU HAVE
FACTOR: WHO YOU ARE
Source: http://en.wikipedia.org/wiki/Multi-factor_authentication#Background
ADD PASSWORD RECOVERY
FEATURES
• Choose your reminders and questions wisely!
• Safe
• Stable
• Memorable
• Simple
• Many
• Choose questions that satisfy one or more of these criteria.
Source: http://goodsecurityquestions.com/examples
RECOVERING FROM A STOLEN
PASSWORD
• Change the password
• Assess & repair the damage
• Scan & protect your systems for vulnerabilities
ASSESS & REPAIR THE DAMAGE:
EMAIL & SOCIAL MEDIA
• Facebook: Hacked Accounts
• Twitter: My Account has been hacked
• Instagram: Hacked account
• Snapchat: My account is hacked
• Google: You think someone else is using your account
• RWU Email: 401-254-6363 (Media•Tech Support Center)
ASIDE: SOCIAL MEDIA SAVVY
• Know and use the security features of your social media
sites.
• Be careful who “friends”, “follows”, or “links” to you.
• Keep your personal information private.
• Review regularly “apps” and other tools that link to your
social media accounts!
ASSESS THE DAMAGE: FINANCES
• Check your credit report: annualcreditreport.com
• Monitor your accounts
• Know the difference between your options: fraud alert, lock,
security freeze
• Federal Trade Commission: Place a Fraud Alert
• Contact the credit bureaus:
• Equifax, Experian, Transunion
PROTECT YOUR SYSTEMS!
• Computers, Antivirus:
• Avast! (W/M)
• Microsoft Security Essentials (W)
• Sophos (M)
• Computers, Malware:
• Malwarebytes (W)
• Sophos (M)
• Tablets/phones:
• Add security lock
• Find my iPad/iPhone
• Lookout Mobile Security (Android/iOS)
PROTECT YOUR SYSTEMS!
• IoT/”Smart” devices (e.g. Amazon Echo, Fitbit, Webcams)*
• Change default passwords
• Update the “firmware” regularly
• Use encryption
• Set up a private network for the devices
• Limit connections to “updates only”
• BitDefender Box
* See How To Protect Your IoT Devices
IMAGE CREDITS
• Think big: “Magic 8 Ball” by “Christian Heldt”.
• Change your passwords often: “All four seasons – Outside
my window” by Sundar M licensed under CC by SA 2.0
IMAGE CREDITS
• Avoid Using the Same Password Repeatedly: “MoneyCash”
by 2bgr8STOCK , licensed under CC by 3.0; “Instagram and
other Social Media Apps” by Jason Howie, licensed under CC
by 2.0. Other images courtesy of RWULaw, Microsoft.
• I changed all my passwords to “incorrect”: “You’ll never
forget your password ever again” by Meme Binge, licensed
under CC by 2.0.
IMAGE CREDITS
• Use Multi-Factor Authentication when Available: “Step 1:
Ready your ATM card” by Colin McCloskey, licensed under
CC by NC-SA 2.0.
• Factor: What you Know: “ATM keypad 2/4” by redspotted,
licensed under CC by 2.0.
IMAGE CREDITS
• Factor: What You Have:
• ATM card: “PHOTO365 DAY 4” by Allan Donque, licensed
under CC by 2.0
• Security keys: “RSA Tokens” by Edwin Sarmiento, licensed
under CC by SA 2.0
• Mobile phone: “Sony Experia Neo MT15i Mobile Phone” by
Matt Kleffer, licensed under CC by SA 2.0
IMAGE CREDITS
• Factor: Who You Are:
• Fingerprint: “Fingerprint” by Jose Luis Agapito, licensed under
CC by ND 2.0
• Eye Scan: iRobot Eye v2.o, by Tc Morgan, licensed under CC by
NC SA 2.0
• Face recognition: “MyHeritage.com Face Recognition” by
MyHeritage.com
QUESTIONS?
• Let us know!
lawlibraryhelp@rwu.edu
or
401-254-4547
• Class Webpage:
http://lawguides.rwu.edu/appyhour/passwords

More Related Content

What's hot

State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016IMMUNIO
 
Passwords, Attakcks, and Security, oh my!
Passwords, Attakcks, and Security, oh my!Passwords, Attakcks, and Security, oh my!
Passwords, Attakcks, and Security, oh my!Michele Butcher
 
Internet browser and search engines
Internet browser and search enginesInternet browser and search engines
Internet browser and search enginesJoshua Pasion
 
GoSec 2015 - Protecting the web from within
GoSec 2015 - Protecting the web from withinGoSec 2015 - Protecting the web from within
GoSec 2015 - Protecting the web from withinIMMUNIO
 
Accessible Twitter : ACCESS-IT@Web 2.0
Accessible Twitter : ACCESS-IT@Web 2.0Accessible Twitter : ACCESS-IT@Web 2.0
Accessible Twitter : ACCESS-IT@Web 2.0Dennis Lembree
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
RailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
RailsConf 2015 - Metasecurity: Beyond Patching VulnerabilitiesRailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
RailsConf 2015 - Metasecurity: Beyond Patching VulnerabilitiesIMMUNIO
 
Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Miguel de la Cruz
 
Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Michele Butcher-Jones
 
7 duplicate content myths that simply aren't true
7 duplicate content myths that simply aren't true7 duplicate content myths that simply aren't true
7 duplicate content myths that simply aren't trueWebMeUp
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network securityDamon Cortesi
 
InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0Michael Gough
 
Twitter Tools For Strategic Marketing
Twitter Tools For Strategic MarketingTwitter Tools For Strategic Marketing
Twitter Tools For Strategic MarketingAdele McAlear
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecorePINT Inc
 
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid ThemSiteGround.com
 

What's hot (20)

State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Keep Your SIte Secure
Keep Your SIte SecureKeep Your SIte Secure
Keep Your SIte Secure
 
Are You Safe From Hackers
Are You Safe From HackersAre You Safe From Hackers
Are You Safe From Hackers
 
Passwords, Attakcks, and Security, oh my!
Passwords, Attakcks, and Security, oh my!Passwords, Attakcks, and Security, oh my!
Passwords, Attakcks, and Security, oh my!
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Internet browser and search engines
Internet browser and search enginesInternet browser and search engines
Internet browser and search engines
 
GoSec 2015 - Protecting the web from within
GoSec 2015 - Protecting the web from withinGoSec 2015 - Protecting the web from within
GoSec 2015 - Protecting the web from within
 
Accessible Twitter : ACCESS-IT@Web 2.0
Accessible Twitter : ACCESS-IT@Web 2.0Accessible Twitter : ACCESS-IT@Web 2.0
Accessible Twitter : ACCESS-IT@Web 2.0
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
RailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
RailsConf 2015 - Metasecurity: Beyond Patching VulnerabilitiesRailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
RailsConf 2015 - Metasecurity: Beyond Patching Vulnerabilities
 
Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)Vulnerabilidades en sitios web (english)
Vulnerabilidades en sitios web (english)
 
Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015
 
7 duplicate content myths that simply aren't true
7 duplicate content myths that simply aren't true7 duplicate content myths that simply aren't true
7 duplicate content myths that simply aren't true
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network security
 
InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0InnoTech 2017_Defend_Against_Ransomware 3.0
InnoTech 2017_Defend_Against_Ransomware 3.0
 
Web browser(16 03-2018)
Web browser(16 03-2018)Web browser(16 03-2018)
Web browser(16 03-2018)
 
Twitter Tools For Strategic Marketing
Twitter Tools For Strategic MarketingTwitter Tools For Strategic Marketing
Twitter Tools For Strategic Marketing
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
 
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them
 

Similar to Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFOWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFBrian Huff
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientationmohannadalhanahnah
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesMichael Dessecker
 

Similar to Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords (20)

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADFOWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
OWASP Top 10 Security Vulnerabilities, and Securing them with Oracle ADF
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Password management
Password managementPassword management
Password management
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn Changes
 

More from rmortiz66

How to Create BNA Newsletter Alerts on Bloomberg Law
How to Create BNA Newsletter Alerts on Bloomberg LawHow to Create BNA Newsletter Alerts on Bloomberg Law
How to Create BNA Newsletter Alerts on Bloomberg Lawrmortiz66
 
The Bluebook for Moot Court
The Bluebook for Moot CourtThe Bluebook for Moot Court
The Bluebook for Moot Courtrmortiz66
 
Bluebook Bootcamp for Law Review
Bluebook Bootcamp for Law ReviewBluebook Bootcamp for Law Review
Bluebook Bootcamp for Law Reviewrmortiz66
 
Using IFTTT to follow topics on Twitter
Using IFTTT to follow topics on TwitterUsing IFTTT to follow topics on Twitter
Using IFTTT to follow topics on Twitterrmortiz66
 
Using IFTTT to follow topics on blogs
Using IFTTT to follow topics on blogsUsing IFTTT to follow topics on blogs
Using IFTTT to follow topics on blogsrmortiz66
 
Capture everything with evernote
Capture everything with evernoteCapture everything with evernote
Capture everything with evernotermortiz66
 
MS Office PowerTips: Word
MS Office PowerTips: WordMS Office PowerTips: Word
MS Office PowerTips: Wordrmortiz66
 

More from rmortiz66 (7)

How to Create BNA Newsletter Alerts on Bloomberg Law
How to Create BNA Newsletter Alerts on Bloomberg LawHow to Create BNA Newsletter Alerts on Bloomberg Law
How to Create BNA Newsletter Alerts on Bloomberg Law
 
The Bluebook for Moot Court
The Bluebook for Moot CourtThe Bluebook for Moot Court
The Bluebook for Moot Court
 
Bluebook Bootcamp for Law Review
Bluebook Bootcamp for Law ReviewBluebook Bootcamp for Law Review
Bluebook Bootcamp for Law Review
 
Using IFTTT to follow topics on Twitter
Using IFTTT to follow topics on TwitterUsing IFTTT to follow topics on Twitter
Using IFTTT to follow topics on Twitter
 
Using IFTTT to follow topics on blogs
Using IFTTT to follow topics on blogsUsing IFTTT to follow topics on blogs
Using IFTTT to follow topics on blogs
 
Capture everything with evernote
Capture everything with evernoteCapture everything with evernote
Capture everything with evernote
 
MS Office PowerTips: Word
MS Office PowerTips: WordMS Office PowerTips: Word
MS Office PowerTips: Word
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords

  • 1. PREPARE FOR PRACTICE Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
  • 4. TODAY’S AGENDA • Creating strong passwords • Monitoring your passwords • Remembering your passwords • Recovering from a stolen password • More information
  • 5. ARE YOU USING STRONG PASSWORDS? • How secure is my password? (sponsored by Dashlane) • The Password Meter
  • 6. AVOID BAD PASSWORDS Source: https://www.teamsid.com/worst-passwords-2016/
  • 8. SOME TIPS: Do • Start with: • Sentence (abbreviated) • Passphrase • Misspelled longer words • Unrelated words string • Add upper and lower case • Add some numbers • Add some symbols Don’t • Repeat part of your user name • Use something others know about You • Use real words only • Only replace letters with symbols to make common words more “secure” • Write down your passwords (use a password manager)
  • 9. EXAMPLES Starting Points • Abbreviated sentence: • The first President was George Washington  TfPwGeoWash • Passphrase: • President Barack Obama attended Columbia and Harvard Law  • BarackObamaColumbiaHarvardLaw
  • 10. EXAMPLES Starting Points (cont’d) • Misspelled Words: • crustacean exoskeleton  crostescien eksoschelatun • Unrelated words string: • Newporthippogreenpopcorn
  • 11. EXAMPLES (CONT’D) Add: Upper and Lower Case • TfPwGeoWash  TfPwGeOWasH • BarackObamaColumbiaHarvardLaw  BaracKObamAColumbiAHarvarDLaw • crostescien eksoschelatun  CrosTeScienEksoScheLaTun • Newporthippogreenpopcorn  NewPortHipPoGrEenPopCorn
  • 12. EXAMPLES (CONT’D) Add: Numbers & Symbols • TfPwGeOWasH  17TfPwGeOWasH99  17TfPwG$OW@sH99* • BaracKObamAColumbiAHarvarDLaw  61BaracKObamA83ColumbiA91HarvarDLaw 61B@racKOb@mA83Co!umbiA91H@rvarDLaw#  • CrosTeScienEksoScheLaTun  Cr0sT3ScienEks0Sch3LaTun  Cr0sT3Sc!enEks0Sch3L@Tun • N3wP8r+H!pP0GrE#nP@pCorn Learn More: See Resources: Creating Strong Passwords on the class page for more ideas on creating strong passwords.
  • 13. AVOID USING THE SAME PASSWORD REPEATEDLY
  • 15. USE A PASSWORD MANAGER See: Use a Password Manager on the class page for links to these products.
  • 16. PASSWORD MANAGER KEY FEATURES • Operating systems • Browser integration/Form Filling • Mobile Platforms • Secure sharing • Password generation • Price: Free, Freemium, Paid, Educational discounts • BONUS! Security Alerts • BONUS! Two factor authentication
  • 17. “Lastpass, a company that offers users a way to centrally manage all of their passwords online with a single master password, disclosed Monday that intruders had broken into its databases and made off with user email addresses and password reminders, among other data.” – Posted June 16, 2015 Source: http://krebsonsecurity.com/2015/06/password-manager-lastpass-warns- of-breach/ BUT KEEP IN MIND…
  • 18. HOW ELSE CAN YOU PROTECT YOURSELF? • Don’t share passwords with anyone! • Don’t reuse passwords on important sites. • If you do share a password, share WISELY via email. • Monitor your email addresses. • Use multi-factor authentication, when available. • Add password recovery features to your accounts.
  • 19.
  • 20. MONITOR YOUR EMAIL • BreachAlarm • ‘;--have I been pwned
  • 22. FACTOR: WHAT YOU KNOW What is your mother’s maiden name?
  • 24. FACTOR: WHO YOU ARE Source: http://en.wikipedia.org/wiki/Multi-factor_authentication#Background
  • 25. ADD PASSWORD RECOVERY FEATURES • Choose your reminders and questions wisely! • Safe • Stable • Memorable • Simple • Many • Choose questions that satisfy one or more of these criteria. Source: http://goodsecurityquestions.com/examples
  • 26. RECOVERING FROM A STOLEN PASSWORD • Change the password • Assess & repair the damage • Scan & protect your systems for vulnerabilities
  • 27. ASSESS & REPAIR THE DAMAGE: EMAIL & SOCIAL MEDIA • Facebook: Hacked Accounts • Twitter: My Account has been hacked • Instagram: Hacked account • Snapchat: My account is hacked • Google: You think someone else is using your account • RWU Email: 401-254-6363 (Media•Tech Support Center)
  • 28. ASIDE: SOCIAL MEDIA SAVVY • Know and use the security features of your social media sites. • Be careful who “friends”, “follows”, or “links” to you. • Keep your personal information private. • Review regularly “apps” and other tools that link to your social media accounts!
  • 29. ASSESS THE DAMAGE: FINANCES • Check your credit report: annualcreditreport.com • Monitor your accounts • Know the difference between your options: fraud alert, lock, security freeze • Federal Trade Commission: Place a Fraud Alert • Contact the credit bureaus: • Equifax, Experian, Transunion
  • 30. PROTECT YOUR SYSTEMS! • Computers, Antivirus: • Avast! (W/M) • Microsoft Security Essentials (W) • Sophos (M) • Computers, Malware: • Malwarebytes (W) • Sophos (M) • Tablets/phones: • Add security lock • Find my iPad/iPhone • Lookout Mobile Security (Android/iOS)
  • 31. PROTECT YOUR SYSTEMS! • IoT/”Smart” devices (e.g. Amazon Echo, Fitbit, Webcams)* • Change default passwords • Update the “firmware” regularly • Use encryption • Set up a private network for the devices • Limit connections to “updates only” • BitDefender Box * See How To Protect Your IoT Devices
  • 32. IMAGE CREDITS • Think big: “Magic 8 Ball” by “Christian Heldt”. • Change your passwords often: “All four seasons – Outside my window” by Sundar M licensed under CC by SA 2.0
  • 33. IMAGE CREDITS • Avoid Using the Same Password Repeatedly: “MoneyCash” by 2bgr8STOCK , licensed under CC by 3.0; “Instagram and other Social Media Apps” by Jason Howie, licensed under CC by 2.0. Other images courtesy of RWULaw, Microsoft. • I changed all my passwords to “incorrect”: “You’ll never forget your password ever again” by Meme Binge, licensed under CC by 2.0.
  • 34. IMAGE CREDITS • Use Multi-Factor Authentication when Available: “Step 1: Ready your ATM card” by Colin McCloskey, licensed under CC by NC-SA 2.0. • Factor: What you Know: “ATM keypad 2/4” by redspotted, licensed under CC by 2.0.
  • 35. IMAGE CREDITS • Factor: What You Have: • ATM card: “PHOTO365 DAY 4” by Allan Donque, licensed under CC by 2.0 • Security keys: “RSA Tokens” by Edwin Sarmiento, licensed under CC by SA 2.0 • Mobile phone: “Sony Experia Neo MT15i Mobile Phone” by Matt Kleffer, licensed under CC by SA 2.0
  • 36. IMAGE CREDITS • Factor: Who You Are: • Fingerprint: “Fingerprint” by Jose Luis Agapito, licensed under CC by ND 2.0 • Eye Scan: iRobot Eye v2.o, by Tc Morgan, licensed under CC by NC SA 2.0 • Face recognition: “MyHeritage.com Face Recognition” by MyHeritage.com
  • 37. QUESTIONS? • Let us know! lawlibraryhelp@rwu.edu or 401-254-4547 • Class Webpage: http://lawguides.rwu.edu/appyhour/passwords

Editor's Notes

  1. Redsox = Instantly Redsox2004 = 6 years Thebostonredsoxrule = 3 quadrillionyears Th3B@st0nr3ds@Ru13 = 71 Quadrillion years
  2. Note that while some systems will require symbols, sometimes the symbols you may use are restricted. Follow these basic principles with whatever you are allowed to use.
  3. Select a sentence, phrase, or words that are meaningful to you. History buff? Use a historical fact as a base sentence. Creating a login for a school page? Use multiple facts about yourself as the passphrase.
  4. Bio major? Use terms from your field as a starting point. String a few favorite things of unrelated things: town, animal, color, snack
  5. Use “systems” to add to your base password. In the first two examples, since I already had some upper case where it would normally be used, I added it at the end of words, consistently. For the last example, I used uppercase for each syllable.
  6. If possible, use related numbers to add to your password, but use them unexpectedly. For example, while many may remember that George Washington was president from 1789 to 1797, it might be harder for some to guess that he died in 1799. For Barack Obama, the years would normally appear after the related fact, but here we put the years of birth and graduations before the names. For misspelled words that don’t have a number easily associated with them, you can use common replacement symbols for letters. Misspelled longer words are unlikely to be in a hacker dictionary. Use a system, however. Here, the first o and e that are not the first letter of the syllable were replaced with zero and three, respectively. Add symbols unexpectedly. Many people use an exclamation mark at the end of a password. Add it to replace ones, ells, or eyes. The @ symbol is frequently used for the letter a, so that is an easy substitution as long as you have changed enough other characters ---The three passwords created here passed “How Secure is My Password” with flying colors, and would take trillions or more years to be cracked by a computer.
  7. But use some common sense. Hackers want your personal/financial/health info, not your research (at least while you’re in law school). All of my passwords for research related sites are the same or a variation of a word that I use, if the site requires a more secure password. Hackers will not be trying to hack my HeinOnline or EBSCO password, they want my American Express password! As a rule of thumb, if a site has financial, health or personal information about you that could be used to hack your other accounts, then you need a unique password for that site.
  8. While some systems will force you to change passwords every semester or every x number of days, many will not. Schedule password changes for sensitive accounts according to the seasons, at least once a year. You don’t have to change all of them at once. For example, you could change school related ones in the fall, money related ones in the spring, passwords for fun things in the summer, and work related ones in the winter.
  9. If you are using longer and complex passwords, writing them down may defeat the purpose of creating them! A password manager can help!
  10. The moral here is that even password managers are vulnerable. So use something memorable that only you and a trusted relative will know. Pick reminder questions that others can't answer by using Google or Facebook. Use an intricate fact as your passphrase. For example, something from your childhood or something memorable from a TV show or movie that you like. It could be something like “My brother’s sport in high school was track and field” or “Dexter called his brother Biney when he was a kid” (both true). My passphrase for my password manager is a favorite childhood memory that is not on social media or the web and very few people know.
  11. I've aor easy discussed the first three, now let's look at others.
  12. BUT SEE LASTPASS BREACH
  13. Fraud alert: A fraud alert allows creditors to get a copy of your credit report as long as they take steps to verify your identity. Placing a fraud alert is free. The initial fraud alert stays on your credit report for 90 days. Be sure the credit reporting companies have your current contact information so they can get in touch with you. Lock: Ability to lock and unlock your credit report. Free to $24.99 per month. Freeze: The credit bureau restricts access to your credit report, to prevent open new accounts in your name. There may be a fee, depending on state law.