SlideShare a Scribd company logo
1 of 12
Unit-2
Password Selection,Piggybacking,shoulder
surfing
Password
 On computer systems where multiple users share disk
space and system resources, each user is given a
computer account.
 How does the system know who is authorized to access
and use this account?
 The user enters a password. If the user enters the
correct password, access is granted.
 When you first get your account, some computer
systems assign a password to you and you can't
change it, but on the vast majority of systems, including
the UNIX workstations in, it is up to the user to select a
password for his or her account.
 Selecting a strong password is the single most
important thing you can do to protect your information
from unauthorized access.
Need of Strong Password
 if your computer system is connected
to the internet, and almost all are
today, anyone in the world who can
connect to the internet can attempt to
access your account by guessing your
password.
 All that is needed is your account
name or id, and this information isn't
difficult to obtain on many computer
systems.
How to choose a strong
password
 uSE BoTh UppEr and loWEr Case
Characters, digits, punctuation, and
!@#$%^&* characters (and not just as the
last character of you password only) if your
computer system allows it. The more
complex and random the password is, the
harder it is to crack.
How to choose a strong
password
 You should try to choose a password that
uses the maximum number of characters
allowed. On UNIX systems, the maximum
password length is 8 characters. As a
minimum your password should be 6
characters.
 Change your password regularly
 Beware of people hanging over your
shoulder when you type your pas
 Don't use a word in the English dictionary or
a minor variation on that word.sword.
How to choose a strong
password
 Never tell your password to anyone.
 Never write your password down.
 Don't use simple patterns of adjacent
letters on the keyboard.(zxcvb etc.)
Shoulder Surfing
 Shoulder surfing refers to a direct observation,
such as looking over a person's shoulder, to
obtain information.
 In some cases shoulder surfing is done for no
reason other than to get an answer, but in other
instances it may constitute a security breach as
the the person behind may be gleaning private
information such as your PIN at a bank machine,
or Credit card information as you enter it into
 a Web based shopping cart check-out. While
shoulder surfing is most common in busy and
crowed areas where the perpetrator is not as
likely to be caught, shoulder surfing can also be
done with the aid of cameras from a more remote
location.
Shoulder Surf
Shoulder Surf-Prevention
 it is advised to shield paperwork or the
keypad from view by using one’s body
or cupping one’s hand.
 When working on a laptop, ensure that
your back is to a wall with no open
sides close to you or to enter your
passwords in a secluded location.
Piggybacking
 Piggybacking, in a wireless
communications context, is the
unauthorized access of a wireless
LAN.
 The usual purpose of piggybacking is
simply to gain free network access
rather than any malicious intent, but it
can slow down data transfer for
legitimate users of the network.
Piggybacking
 It's quite simple to access an unsecured
wireless network: All you have to do is
get into the range of a Wi-
Fi hotspot's signal and select your
chosen network from the options
presented.
 However, unauthorized network access,
even to free Wi-Fi, may be illegal. People
have been fined for accessing hot spots
from outside businesses, such as coffee
shops, that provide free Wi-Fi for
Piggybacking -Prevention
 To protect your network from
piggybacking, ensure that encryption is
enabled for yourrouter.
 Use Wireless Encryption Protocol (WEP)
if that's your only option, but if possible
use Wireless Protected Access (WPA) or
WPA2.
 Use a strong password for your
encryption key, consisting of at least 14
characters and mixing letters and
numbers.

More Related Content

What's hot

Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry EditorSanjeev Kumar Jaiswal
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipherVaibhav Khanna
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherSHUBHA CHATURVEDI
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 

What's hot (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry Editor
 
Kerberos
KerberosKerberos
Kerberos
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Network Security
Network SecurityNetwork Security
Network Security
 

Viewers also liked

Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsYulian Slobodyan
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...Kenny Ong
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashingRafi Dar
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tablesadil raja
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Network security ppt
Network security pptNetwork security ppt
Network security pptshashi712
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 

Viewers also liked (20)

Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography Basics
 
it act
it actit act
it act
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashing
 
Ch17 Hashing
Ch17 HashingCh17 Hashing
Ch17 Hashing
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tables
 
Hashing PPT
Hashing PPTHashing PPT
Hashing PPT
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Hashing
HashingHashing
Hashing
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
biometrics
biometricsbiometrics
biometrics
 

Similar to Password selection,piggybacking-

Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingDanae Rosville
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security SystemMatthew Bricker
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfaoneonlinestore1
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfinfosec train
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4nayamat32
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Fego Ogwara
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 

Similar to Password selection,piggybacking- (20)

Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Network Security
Network SecurityNetwork Security
Network Security
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When Travelling
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
 
Wireless security
Wireless securityWireless security
Wireless security
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Network security-1195284736736860-4
Network security-1195284736736860-4Network security-1195284736736860-4
Network security-1195284736736860-4
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 

Password selection,piggybacking-

  • 2. Password  On computer systems where multiple users share disk space and system resources, each user is given a computer account.  How does the system know who is authorized to access and use this account?  The user enters a password. If the user enters the correct password, access is granted.  When you first get your account, some computer systems assign a password to you and you can't change it, but on the vast majority of systems, including the UNIX workstations in, it is up to the user to select a password for his or her account.  Selecting a strong password is the single most important thing you can do to protect your information from unauthorized access.
  • 3. Need of Strong Password  if your computer system is connected to the internet, and almost all are today, anyone in the world who can connect to the internet can attempt to access your account by guessing your password.  All that is needed is your account name or id, and this information isn't difficult to obtain on many computer systems.
  • 4. How to choose a strong password  uSE BoTh UppEr and loWEr Case Characters, digits, punctuation, and !@#$%^&* characters (and not just as the last character of you password only) if your computer system allows it. The more complex and random the password is, the harder it is to crack.
  • 5. How to choose a strong password  You should try to choose a password that uses the maximum number of characters allowed. On UNIX systems, the maximum password length is 8 characters. As a minimum your password should be 6 characters.  Change your password regularly  Beware of people hanging over your shoulder when you type your pas  Don't use a word in the English dictionary or a minor variation on that word.sword.
  • 6. How to choose a strong password  Never tell your password to anyone.  Never write your password down.  Don't use simple patterns of adjacent letters on the keyboard.(zxcvb etc.)
  • 7. Shoulder Surfing  Shoulder surfing refers to a direct observation, such as looking over a person's shoulder, to obtain information.  In some cases shoulder surfing is done for no reason other than to get an answer, but in other instances it may constitute a security breach as the the person behind may be gleaning private information such as your PIN at a bank machine, or Credit card information as you enter it into  a Web based shopping cart check-out. While shoulder surfing is most common in busy and crowed areas where the perpetrator is not as likely to be caught, shoulder surfing can also be done with the aid of cameras from a more remote location.
  • 9. Shoulder Surf-Prevention  it is advised to shield paperwork or the keypad from view by using one’s body or cupping one’s hand.  When working on a laptop, ensure that your back is to a wall with no open sides close to you or to enter your passwords in a secluded location.
  • 10. Piggybacking  Piggybacking, in a wireless communications context, is the unauthorized access of a wireless LAN.  The usual purpose of piggybacking is simply to gain free network access rather than any malicious intent, but it can slow down data transfer for legitimate users of the network.
  • 11. Piggybacking  It's quite simple to access an unsecured wireless network: All you have to do is get into the range of a Wi- Fi hotspot's signal and select your chosen network from the options presented.  However, unauthorized network access, even to free Wi-Fi, may be illegal. People have been fined for accessing hot spots from outside businesses, such as coffee shops, that provide free Wi-Fi for
  • 12. Piggybacking -Prevention  To protect your network from piggybacking, ensure that encryption is enabled for yourrouter.  Use Wireless Encryption Protocol (WEP) if that's your only option, but if possible use Wireless Protected Access (WPA) or WPA2.  Use a strong password for your encryption key, consisting of at least 14 characters and mixing letters and numbers.