SlideShare a Scribd company logo
GOOD PASSWORD
WHY HAVING A GOOD PASSWORD IS
          IMPORTANT


             BY
      YASIN GHAZZAWI
WHERE DO WE USE OUR
  PASSWORDS?


                                     Go.woodbury.edu




www.chase.com     www.Tumblr.com




                                   www.gmail.co
                                   m



                www.Bofa.com         Facebook.com
WHY DO WE WANT A GOOD PASSWORD?

  Answer: To be protected.                         From what?
      From:
 1.    Identity Theft (Matthew Ballard)
 2.    Theft of Important information or database
 3.    Unknown monetary transfers (phishing)
 4.    Much more…
 LinkedIn hacked! On June 6
 2012, approximately 6.5 million
 passwords and e-mails were
 reportedly released to the web by a
 hacker.
 eHarmony was also hacked on June
 6th
WHAT MAKES A GOOD
     PASSWORD?
      Good password = Strong password
      Strong password = Not easy to guess
      Good password = Hardest to guess


                                   • Use symbols e.g. @ * ( ) [ ] ! +
                                   •At least 8 characters --------
                                   • Do not use nicknames or words you use
                                   frequently e.g. “Yolo” ,“baller” , “Nerd” ,
                                   “awesomesauce” etc…
                                   • Switch it up between UPPER CASE &
                                   lower case letters
                                   •Use a combination of letters, numbers,
                                   and special characters
                                   • Use different passwords on
                                   different systems!
http://www.passwordmeter.com/
FUN FACTS ON PASSWORDS
 A pet’s name appears in passwords 3 times more frequent than a
   name of any other member of a person’s family.[1]
 28.6% of the users use the Remember my password function [2]
 To protect a personal electronic diary and photo archives, an average
   person sets a password 2 times stronger than to protect his/her
   corporate and financial documents. [1]
 66% of the US users have only one or two passwords[2]
 Many important business and confidential files are protected with
   romantic passwords, such as
   “LoveSue”, “eternity”, “marryme”, “forgiveus”. [1]




[1] http://www.facebook.com/note.php?note_id=194911923880468
[2] http://computersight.com/communication-networks/security/interesting-facts-about-
passwords/#ixzz1x6g3RG6t
THANK YOU!

More Related Content

Similar to Good Password

Password management
Password managementPassword management
Password management
Wilmington University
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
Web Success Coaching
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
Molly Immendorf
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
Web Success Coaching
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoid
Venkatarangan Thirumalai
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
Irene Mackintosh
 
Identity
IdentityIdentity
Identity
Beth Gallaway
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
David Herrington
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
Marian Merritt
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
ahyaimie
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Security Basics - Internet Safety
Security Basics - Internet SafetySecurity Basics - Internet Safety
Security Basics - Internet Safety
Axxes IT Consultancy
 
Take Charge of Your Digital Life
Take Charge of Your Digital LifeTake Charge of Your Digital Life
Take Charge of Your Digital Life
emilyensign
 
Password management for you
Password management for youPassword management for you
Password management for you
Chit Ko Ko Win
 

Similar to Good Password (16)

Password management
Password managementPassword management
Password management
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoid
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
 
Identity
IdentityIdentity
Identity
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Security Basics - Internet Safety
Security Basics - Internet SafetySecurity Basics - Internet Safety
Security Basics - Internet Safety
 
Take Charge of Your Digital Life
Take Charge of Your Digital LifeTake Charge of Your Digital Life
Take Charge of Your Digital Life
 
Password management for you
Password management for youPassword management for you
Password management for you
 

Recently uploaded

Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Good Password

  • 1. GOOD PASSWORD WHY HAVING A GOOD PASSWORD IS IMPORTANT BY YASIN GHAZZAWI
  • 2. WHERE DO WE USE OUR PASSWORDS? Go.woodbury.edu www.chase.com www.Tumblr.com www.gmail.co m www.Bofa.com Facebook.com
  • 3. WHY DO WE WANT A GOOD PASSWORD?  Answer: To be protected. From what? From: 1. Identity Theft (Matthew Ballard) 2. Theft of Important information or database 3. Unknown monetary transfers (phishing) 4. Much more… LinkedIn hacked! On June 6 2012, approximately 6.5 million passwords and e-mails were reportedly released to the web by a hacker. eHarmony was also hacked on June 6th
  • 4. WHAT MAKES A GOOD PASSWORD?  Good password = Strong password  Strong password = Not easy to guess  Good password = Hardest to guess • Use symbols e.g. @ * ( ) [ ] ! + •At least 8 characters -------- • Do not use nicknames or words you use frequently e.g. “Yolo” ,“baller” , “Nerd” , “awesomesauce” etc… • Switch it up between UPPER CASE & lower case letters •Use a combination of letters, numbers, and special characters • Use different passwords on different systems! http://www.passwordmeter.com/
  • 5. FUN FACTS ON PASSWORDS  A pet’s name appears in passwords 3 times more frequent than a name of any other member of a person’s family.[1]  28.6% of the users use the Remember my password function [2]  To protect a personal electronic diary and photo archives, an average person sets a password 2 times stronger than to protect his/her corporate and financial documents. [1]  66% of the US users have only one or two passwords[2]  Many important business and confidential files are protected with romantic passwords, such as “LoveSue”, “eternity”, “marryme”, “forgiveus”. [1] [1] http://www.facebook.com/note.php?note_id=194911923880468 [2] http://computersight.com/communication-networks/security/interesting-facts-about- passwords/#ixzz1x6g3RG6t