SlideShare a Scribd company logo
STEPHANY LORENA PRADO RIASCOS UNIT 9 LESSON D – PAG 93 Keepingitsafe
WHAT IS PERSONAL INFORMATION OR SAFETY This refers to information that can be used to identify, contact or locate a specific person, or be used along with other information sources to do.
¡¡¡DIFFERENT WAYS TO PROTECT YOUR PERSONAL ACCOUNTS!!! To an attacker, a strong password should look like a random string of characters. You can get your password is safe if it uses the following criteria: ,[object Object],[object Object]
The fewer types of characters in the password, the longer it must be. A 15-character password composed only of random letters and numbers is about 33,000 times stronger than an 8-character password composed of characters of all kinds. If the password can not contain symbols, should be considerably longer to achieve the same degree of protection. An ideal password combines both length and different types of symbols.,[object Object],[object Object]
3. If the computer or online system does not support pass phrases, convert it to a password. Use the first letter of each word in the phrase that has been created to define a new, nonsensical word. Taking the above example sentence, we have: "mhatta."  4. Add complexity by mixing uppercase and lowercase letters and numbers. Also useful letter swapping or misspellings as well. For example, in the previous sentence, consider misspelling Aiden's name, or substituting the word "three" with the number (3). There are many possible substitutions, the longer the sentence, the more complex the password. The phrase might eventually become "My Son is 3 yeeRs Ang3l." If the computer or online system does not support pass phrases, use the same technique on the shorter password. The result could be a password like "MsAy3yo." 
5. Finally, substitute some special characters. You can use symbols that look like letters, combine words (remove spaces) and use other means to make the password more complex. Using these tricks, we create a pass phrase as "MiHiJo @ ng3l ti3n3 3 anionic $" or a shorter password (using the first letters of each word) "@ T3a Mihi."  6. Try the password with Password Checker. Password Checker is a feature of this Web site that helps you determine the level of security offered by a password as you type (such figures are not recorded). 
IN CONCLUSION!!!! The surest way to protect personal accounts including e-mail, pin etc.Is making appropriate use of each of these, besides being in constant change passwords, and involve a combination of letters and numbers in each of your accounts.But should not publish personal information on social networks, or provide information to strangers.
THANK YOU HOPE TO BE OF THEIR USE
Page 93 blog 4
Page 93 blog 4

More Related Content

Similar to Page 93 blog 4

Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
New Castle School
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
ahyaimie
 
Password Protection
Password ProtectionPassword Protection
Password Protection
Jenny Hubbard
 
Document
DocumentDocument
Document
Esper Herrera
 
Password management
Password managementPassword management
Password management
Wilmington University
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
Gloria Stoilova
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
anilinvns
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
Toby1
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
Harrison Kenyon Marketing
 
Strong Passwords
Strong PasswordsStrong Passwords
Use of capital letters
Use of capital lettersUse of capital letters
Use of capital letters
Education & Assistance Corp.
 
Password Storage Explained
Password Storage ExplainedPassword Storage Explained
Password Storage Explained
jeetendra mandal
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
SafeSpaceOnline
 
How to Create a Strong Password.pdf
How to Create a Strong Password.pdfHow to Create a Strong Password.pdf
How to Create a Strong Password.pdf
infosec train
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
Razorpoint Security
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
Data Hops
 
Secure passwords
Secure passwordsSecure passwords
Secure passwords
srushtikadu1
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Password
moli he
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password Patterns
nFront Security
 
Is your password_safe_ss
Is your password_safe_ssIs your password_safe_ss
Is your password_safe_ss
Jennifer Young-Boyd
 

Similar to Page 93 blog 4 (20)

Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
Password Protection
Password ProtectionPassword Protection
Password Protection
 
Document
DocumentDocument
Document
 
Password management
Password managementPassword management
Password management
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Use of capital letters
Use of capital lettersUse of capital letters
Use of capital letters
 
Password Storage Explained
Password Storage ExplainedPassword Storage Explained
Password Storage Explained
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
How to Create a Strong Password.pdf
How to Create a Strong Password.pdfHow to Create a Strong Password.pdf
How to Create a Strong Password.pdf
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
 
Secure passwords
Secure passwordsSecure passwords
Secure passwords
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Password
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password Patterns
 
Is your password_safe_ss
Is your password_safe_ssIs your password_safe_ss
Is your password_safe_ss
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

Page 93 blog 4

  • 1. STEPHANY LORENA PRADO RIASCOS UNIT 9 LESSON D – PAG 93 Keepingitsafe
  • 2. WHAT IS PERSONAL INFORMATION OR SAFETY This refers to information that can be used to identify, contact or locate a specific person, or be used along with other information sources to do.
  • 3.
  • 4.
  • 5. 3. If the computer or online system does not support pass phrases, convert it to a password. Use the first letter of each word in the phrase that has been created to define a new, nonsensical word. Taking the above example sentence, we have: "mhatta."  4. Add complexity by mixing uppercase and lowercase letters and numbers. Also useful letter swapping or misspellings as well. For example, in the previous sentence, consider misspelling Aiden's name, or substituting the word "three" with the number (3). There are many possible substitutions, the longer the sentence, the more complex the password. The phrase might eventually become "My Son is 3 yeeRs Ang3l." If the computer or online system does not support pass phrases, use the same technique on the shorter password. The result could be a password like "MsAy3yo." 
  • 6. 5. Finally, substitute some special characters. You can use symbols that look like letters, combine words (remove spaces) and use other means to make the password more complex. Using these tricks, we create a pass phrase as "MiHiJo @ ng3l ti3n3 3 anionic $" or a shorter password (using the first letters of each word) "@ T3a Mihi."  6. Try the password with Password Checker. Password Checker is a feature of this Web site that helps you determine the level of security offered by a password as you type (such figures are not recorded). 
  • 7. IN CONCLUSION!!!! The surest way to protect personal accounts including e-mail, pin etc.Is making appropriate use of each of these, besides being in constant change passwords, and involve a combination of letters and numbers in each of your accounts.But should not publish personal information on social networks, or provide information to strangers.