SlideShare a Scribd company logo
Username Usage and Password Security
Username Usage
Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
Good or Bad? ,[object Object]
 BellaIsabella
 DarkAngel666
 Karla-Love-1996
 SimplyMe
 gun4hiRe
 babyfaceLA
 Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
Password Security
Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event  The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band

More Related Content

Viewers also liked

Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...
Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...
Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...CORE Group
 
Programas vistos en informatica
Programas vistos en informaticaProgramas vistos en informatica
Programas vistos en informatica
Elikirin
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
Jessipatty123
 
TP1 Praktikum PPT
TP1 Praktikum PPTTP1 Praktikum PPT
TP1 Praktikum PPT
Syifaull
 
Developing technologies
Developing technologiesDeveloping technologies
Developing technologies
Girthtrude
 
Plakati 1
Plakati 1Plakati 1
Plakati 1
smuciscanet
 
Perca Do Nilo Contidos Educativos Ii
Perca Do Nilo Contidos Educativos IiPerca Do Nilo Contidos Educativos Ii
Perca Do Nilo Contidos Educativos Ii
aviseiro
 
Unidad educativa
Unidad educativaUnidad educativa
Unidad educativa
Nicole Bonilla
 
Pitch
PitchPitch
Gestão in
Gestão inGestão in
Gestão in
Jonatas Costa
 
Els yorkshiresç
Els yorkshiresçEls yorkshiresç
Els yorkshiresç
anabel
 
Granthyatra
GranthyatraGranthyatra
Granthyatra
amitdangera
 
ITOI præsentation til VSH Erhvervsnetværk
ITOI præsentation til VSH ErhvervsnetværkITOI præsentation til VSH Erhvervsnetværk
ITOI præsentation til VSH Erhvervsnetværk
Virum-Sorgenfri Håndboldklub
 
LA COMUNIDAD Y LA WEB
LA COMUNIDAD Y LA WEBLA COMUNIDAD Y LA WEB
LA COMUNIDAD Y LA WEB
Paola Vargas Jiimenez
 

Viewers also liked (17)

Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...
Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...
Care Groups and Income Generation - Lessons Learned from World Relief Rwanda_...
 
Programas vistos en informatica
Programas vistos en informaticaProgramas vistos en informatica
Programas vistos en informatica
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
TP1 Praktikum PPT
TP1 Praktikum PPTTP1 Praktikum PPT
TP1 Praktikum PPT
 
Developing technologies
Developing technologiesDeveloping technologies
Developing technologies
 
Plakati 1
Plakati 1Plakati 1
Plakati 1
 
Las pizarras y us modalidades
Las pizarras y us modalidadesLas pizarras y us modalidades
Las pizarras y us modalidades
 
Perca Do Nilo Contidos Educativos Ii
Perca Do Nilo Contidos Educativos IiPerca Do Nilo Contidos Educativos Ii
Perca Do Nilo Contidos Educativos Ii
 
Arbor3
Arbor3Arbor3
Arbor3
 
Unidad educativa
Unidad educativaUnidad educativa
Unidad educativa
 
Pitch
PitchPitch
Pitch
 
Gestão in
Gestão inGestão in
Gestão in
 
Els yorkshiresç
Els yorkshiresçEls yorkshiresç
Els yorkshiresç
 
Granthyatra
GranthyatraGranthyatra
Granthyatra
 
ITOI præsentation til VSH Erhvervsnetværk
ITOI præsentation til VSH ErhvervsnetværkITOI præsentation til VSH Erhvervsnetværk
ITOI præsentation til VSH Erhvervsnetværk
 
Susi t.
Susi t.Susi t.
Susi t.
 
LA COMUNIDAD Y LA WEB
LA COMUNIDAD Y LA WEBLA COMUNIDAD Y LA WEB
LA COMUNIDAD Y LA WEB
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Sample2

  • 1. Username Usage and Password Security
  • 3.
  • 4. Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
  • 5. Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
  • 6.
  • 13. Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
  • 14. Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
  • 16. Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band
  • 17. Why are student accounts easily hacked? The password is cracked using a password cracking program. The password is easily guessed by others who know personal things about the student. Students write their passwords down where others are able to see it. Students give their password to friends who then decide to use it or give it to others who use it. Other students see the password as the student enters it on a keyboard.
  • 19. Does your password include the name of a family member or pet? -3 Does your password include a birth date of a family member? -3 Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? -1 Does your password contain a random set of numbers? +2 Does your password contain both letters and numbers? +2 Does your password have 8 or more characters? +2 Does your password have less than 6 characters? -1 Does your password contain one or more non-number, non-letter characters such as a ! Or =? +3 Does the password contain the date of a well known event, such as the date a baseball team won the pennant? -1 Does your password contain at least 3 numbers in numerical sequence such as “123”? -2 Does your password contain any word spelled backwards? -1 Is your password written down on any piece of paper within 15 feet of your computer? -2 Does your password contain your telephone number, zip code, area code, or a portion of them? -2 Does your password include a mixture of UPPER and lower case letters? +2 Have you ever shared your current password with a friend? -3
  • 20. Password Test Scoring EXCELLENT 8 or higher SOMEWHAT GOOD 4-7 Think about adding some other characters to your password VERY POOR Less than 4 Time to make a new password
  • 21. Tips for a VERY STRONG password Always use a mix of letters and numbers Use a mix of UPPER and lower case letters Use characters that are not letters or number such as =!$# Always use a password that contains 6 letters or more Create acronyms (a word that is created by taking the first letter of a sequence of words)
  • 22. Individual Project Create a secure password Think of a line from a song and write it down. Create an acronym from the first letter of each word in the line. Change at lease one letter (not the first) to a capital letter. Add a non-number, non-letter character, or a substitute a ! For an I, $ for an s, etc. Add a two or three digit number.
  • 23. Individual Project Create a secure password Think of the name of someone you admire and write it down. Create a four-letter acronym from the first two letters of their first and last name. Change at least one letter (not the first) to a capital letter. Add a non-number, non-letter character or substitute a ! for an I, $ for an s, etc. Mix in two numbers taken from your age. Don’t put these numbers next to each other.

Editor's Notes

  1. Show picture of boys – have students volunteer to come up to board and use 5 words to describe each boy.By a show of hands – Which boy do you think is more likely to be honest?Which boy do you think is more likely to be mean?Which boy do you think is more likely to be a good friend?Which boy do you think is a better students in school?Why do you think is? Based on looks?Which brings us to an important point – others judge us by how we look, dress, talk, etc. – do you feel that is a true statement? Why or why not? So, when you meet someone online – you only know their username, so the names we choose are very important – do you agree with that statement?
  2. Kids sometimes choose screen names that attract negative attention, hurtful or makes others feel uncomfortable. Choosing the wrong screen name can encourage others to treat you poorly. Explain why you think someone online might harass those with screen names such as these?
  3. Some students choose screen names that give away too much information about themselves. What can you tell about these users?If a stranger strikes up a conversation with you and states “I take karate too” would you be likely to engage in a conversation. Students have a tendency to think that since they are on the computer, the other person “cannot see them” – this is not true! – especially if that user can connect you to an email address.
  4. Have students come up to board – pick a user name that is either good or bad and explain the reasoning why – have them give specific information about what is wrong.
  5. print copies for students and have them work in groups – review names as a class
  6. Handouts – check your password