SlideShare a Scribd company logo
How To Secure
Passwords ?
How do passwords
get hacked ?
Synchronized data
Hackers can attack cloud servers
using various attacks, like
a DDOS (Distributed Denial
of Service) attack or a man-in-the-
cloud attack, to access your data
and passwords.
Always backup your data offline
to an external storage device like
a hard drive or a flash drive.
Suspicious email
and attachments
Hackers use a SMTP (Simple Mail
Transfer Protocol) header injection
to insert malicious viruses, spam, and
phishing websites onto a victim’s
computer.
Don’t open mail that looks like spam
and don’t open unknown
attachments. Instead, first scan the
file using anti-virus software and
always check the header of the email.
Revealing your
mobile number for
social media login
Hackers have found a flaw in Facebook
and other social media networks to gain
access to your account by using the
“Forgot Your Password” function and
diverting the messages from your mobile
phone using a SS7 (Signalling system
number 7) flaw in their system.
Don`t link your phone number with your
social media networks. Instead use your
username or email-address for login.
The Anatomy of an Unbreakable
Password
 The longer the password, the harder it is to crack. Consider a 12-character
password or longer.
 Avoid names, places, and dictionary words.
 Mix it up. Use variations on capitalization, spelling, numbers, and punctuation.
 These three rules make it exponentially harder for hackers to crack your
password
Avoid using these passwords.
►123456
►123456789
►password
►admin
►12345678
►qwerty
►aaaaaa
►1234567
►111111
►photoshop
►123123
►1234567890
►000000
►654321
►abc123
►1234
►adobe1
►macromedia
►azerty
►iloveyou
Methods to Create Secure Passwords that you’ll
Actually Remember
Bruce Schneier's Method
 Security expert Bruce Schneier put forth a password method back in 2008 that he still recommends today. It
works like this: Take a sentence and turn it into a password.
 The sentence can be anything personal and memorable for you. Take the words from the sentence, then
abbreviate and combine them in unique ways to form a password. Here are four sample sentences that I put
together.
 WOO!TPwontSB = Woohoo! The Packers won the Super Bowl!
 PPupmoarT@O@tgs = Please pick up more Toasty O's at the grocery store.
 1tubuupshhh…imj = I tuck button-up shirts into my jeans.
 W?ow?imp::ohth3r = Where oh where is my pear? Oh, there.
Come up with 12 random words.
 You can start with a phrase such as "Even in winter, the dogs party with brooms
and neighbor Kit Kats." Just make sure it is not a simple phrase or a phrase taken
from existing literature. You can grab 12 random words, too: "Pantry duck cotton
ballcap tissue airplane snore oar Christmas puddle log charisma."
 When placed into a password checker, the 12-word pass phrase above shows
that it will take 238,378,158,171,207 quadragintillion years for a brute force attack
to crack.
Password Manager
 After installing a password manager, the software creates and remembers secure
passwords for each of your accounts. All you need to do is choose one secure
password for the manager — and since this protects everything, this had better
be 16 characters long and completely un-guessable. This is much more secure
than using the same weak password for every site, but you are creating one point
of failure.Services that store your master password in the cloud are more
vulnerable to attack.[5]
 The "remember your password" feature that came with your browser or computer
is not a secure password manager.
THANK YOU

More Related Content

Similar to Secure passwords

Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101
Mache Aggie
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
Harrison Kenyon Marketing
 
How to be safe on the internet. Make the web better!
How to be safe on the internet. Make the web better!How to be safe on the internet. Make the web better!
How to be safe on the internet. Make the web better!
Octavian Irimia
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
Mike Barker
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Hajer alriyami
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
Razorpoint Security
 
Strong Passwords
Strong PasswordsStrong Passwords
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
Carson City Library
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
richarddxd
 
Securing password
Securing passwordSecuring password
Securing password
splendorcollege
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
Klaus Drosch
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
William Mann
 
Scouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptxScouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptx
SujayJadhav16
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
WorldTrade3
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
Data Hops
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
Tapan Khilar
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
Venkat Sandeep Manthi
 
Passwords
PasswordsPasswords
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
Alimasmali3
 

Similar to Secure passwords (20)

Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
How to be safe on the internet. Make the web better!
How to be safe on the internet. Make the web better!How to be safe on the internet. Make the web better!
How to be safe on the internet. Make the web better!
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
Securing password
Securing passwordSecuring password
Securing password
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Scouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptxScouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptx
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
 
Passwords
PasswordsPasswords
Passwords
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 

Recently uploaded (16)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 

Secure passwords

  • 3. Synchronized data Hackers can attack cloud servers using various attacks, like a DDOS (Distributed Denial of Service) attack or a man-in-the- cloud attack, to access your data and passwords. Always backup your data offline to an external storage device like a hard drive or a flash drive.
  • 4. Suspicious email and attachments Hackers use a SMTP (Simple Mail Transfer Protocol) header injection to insert malicious viruses, spam, and phishing websites onto a victim’s computer. Don’t open mail that looks like spam and don’t open unknown attachments. Instead, first scan the file using anti-virus software and always check the header of the email.
  • 5. Revealing your mobile number for social media login Hackers have found a flaw in Facebook and other social media networks to gain access to your account by using the “Forgot Your Password” function and diverting the messages from your mobile phone using a SS7 (Signalling system number 7) flaw in their system. Don`t link your phone number with your social media networks. Instead use your username or email-address for login.
  • 6. The Anatomy of an Unbreakable Password  The longer the password, the harder it is to crack. Consider a 12-character password or longer.  Avoid names, places, and dictionary words.  Mix it up. Use variations on capitalization, spelling, numbers, and punctuation.  These three rules make it exponentially harder for hackers to crack your password
  • 7. Avoid using these passwords. ►123456 ►123456789 ►password ►admin ►12345678 ►qwerty ►aaaaaa ►1234567 ►111111 ►photoshop ►123123 ►1234567890 ►000000 ►654321 ►abc123 ►1234 ►adobe1 ►macromedia ►azerty ►iloveyou
  • 8. Methods to Create Secure Passwords that you’ll Actually Remember
  • 9. Bruce Schneier's Method  Security expert Bruce Schneier put forth a password method back in 2008 that he still recommends today. It works like this: Take a sentence and turn it into a password.  The sentence can be anything personal and memorable for you. Take the words from the sentence, then abbreviate and combine them in unique ways to form a password. Here are four sample sentences that I put together.  WOO!TPwontSB = Woohoo! The Packers won the Super Bowl!  PPupmoarT@O@tgs = Please pick up more Toasty O's at the grocery store.  1tubuupshhh…imj = I tuck button-up shirts into my jeans.  W?ow?imp::ohth3r = Where oh where is my pear? Oh, there.
  • 10. Come up with 12 random words.  You can start with a phrase such as "Even in winter, the dogs party with brooms and neighbor Kit Kats." Just make sure it is not a simple phrase or a phrase taken from existing literature. You can grab 12 random words, too: "Pantry duck cotton ballcap tissue airplane snore oar Christmas puddle log charisma."  When placed into a password checker, the 12-word pass phrase above shows that it will take 238,378,158,171,207 quadragintillion years for a brute force attack to crack.
  • 11. Password Manager  After installing a password manager, the software creates and remembers secure passwords for each of your accounts. All you need to do is choose one secure password for the manager — and since this protects everything, this had better be 16 characters long and completely un-guessable. This is much more secure than using the same weak password for every site, but you are creating one point of failure.Services that store your master password in the cloud are more vulnerable to attack.[5]  The "remember your password" feature that came with your browser or computer is not a secure password manager.