SlideShare a Scribd company logo
1 of 4
USED WITH PERMISSION FROM THE OWNER OF INFINITE VAPOR
Lianna Babeli | Operating Systems I | February 23, 2014
Strong Passwords
POLICIES & PROCEDURES
LIANNA BABELI 1
1
Password Policies
For
Infinite Vapor
All employees, including executive staff, should use strong passwords that help
defend against malicious and unauthorized intrusion on all company systems,
including all websites, end user accounts, and systems which require a password
for login that is designed for the business.
All employees, including executive staff, should remember to utilize a password
that does not include any personal information, easily researchable information
concerning one’s social life, and should be as random as possible. This
significantly reduces the chances of a malicious or unauthorized user from
attempting to gain access to any company digital system resources.
The more complex the password involved, within the allowed parameters of the
systems, the less likely it is that an intruder will gain access.
A strong password should include eight characters or longer, with at least one of
the following: uppercase and lowercase letters, numerals (numbers), punctuation
marks, and symbols. The password should be something simple enough to
remember, but complex enough that cannot be easily randomized or easily
researched.
All employees, including executive staff, may not share their passwords with
others without authorization from the individuals and a manager. Do not store
LIANNA BABELI 2
2
passwords on the devices that the passwords protect. Keep a digital and
physical, written, copy of your passwords in multiple safe and trusted locations.
For example, keep a notepad with all your passwords on your person or in a
secure location such as a safe or business locker. Utilize your cellphone’s file
encryption to protect certain apps which may contain passwords OR use a very
well-secured password organizing app.
If you store your company passwords at home on your home system, make sure
that these are as encrypted and secure as the ones you might utilize while at
work.
Do NOT share passwords with anyone who is NOT an employee of the
company. No exceptions to this rule!
Examples that meet the criteria for strong passwords are:
 NaS043$3!@
 J3r3m?132
 <4p1Ng!$350
These are complex, very random passwords that will be relatively easy to
remember while having at least 8 characters, including upper and lowercase
alphabetical characters, at least one numerical, at least one punctuation mark,
and at least one symbol. They have no relation to an individual or to anything
personal or company related.
Examples that do not meet the criteria for strong passwords are:
LIANNA BABELI 3
3
 jenniferb
 mydogbennie
 mywife1982
These are passwords that are very simple and could be easily discovered or
randomly generated by a hacker without even trying. The only thing these have
going for them is that they are more than 8 characters and that the last one uses
several numericals. Using employee names, family members, or anniversary
dates are a very bad idea.
Any questions or concerns about password design and protection should contact
the IT Manager of your store or the Director of IT within the company as a whole.
If you cannot find this individual, ask your Managers for the appropriate contact
or make sure that they can provide a copy of this policy and procedures
handbook.
Thank you for choosing to work at Infinite Vapor and have fun at work!

More Related Content

Viewers also liked

Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliLianna Babeli
 
Top 8 academic director resume samples
Top 8 academic director resume samplesTop 8 academic director resume samples
Top 8 academic director resume sampleslerisjom
 
UT-Arlington Green Roof
UT-Arlington Green RoofUT-Arlington Green Roof
UT-Arlington Green RoofDavid Hopman
 
Why we should get a dog
Why we should get a dogWhy we should get a dog
Why we should get a dogscarlettvinn
 
E&TR A5 4pp Get Involved - Web
E&TR A5 4pp Get Involved - WebE&TR A5 4pp Get Involved - Web
E&TR A5 4pp Get Involved - WebAmber Thomas
 
Top 8 choir director resume samples
Top 8 choir director resume samplesTop 8 choir director resume samples
Top 8 choir director resume sampleslerisjom
 
Advertisements and Children
Advertisements and ChildrenAdvertisements and Children
Advertisements and ChildrenSheldon Anderson
 
parodia sobre a agua
parodia sobre a aguaparodia sobre a agua
parodia sobre a aguadeylims
 
Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen
Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen
Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen Anna Matikainen
 

Viewers also liked (14)

VITRO_D4.3_TEIHAL_FF-20111130
VITRO_D4.3_TEIHAL_FF-20111130VITRO_D4.3_TEIHAL_FF-20111130
VITRO_D4.3_TEIHAL_FF-20111130
 
Unit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - BabeliUnit 9 - Remote Desktop Assistance - Babeli
Unit 9 - Remote Desktop Assistance - Babeli
 
Asmsi
AsmsiAsmsi
Asmsi
 
cBox_eureka11
cBox_eureka11cBox_eureka11
cBox_eureka11
 
Top 8 academic director resume samples
Top 8 academic director resume samplesTop 8 academic director resume samples
Top 8 academic director resume samples
 
UT-Arlington Green Roof
UT-Arlington Green RoofUT-Arlington Green Roof
UT-Arlington Green Roof
 
design2_bay_ispisc
design2_bay_ispiscdesign2_bay_ispisc
design2_bay_ispisc
 
Neven Ragaie C.V.
Neven Ragaie C.V.Neven Ragaie C.V.
Neven Ragaie C.V.
 
Why we should get a dog
Why we should get a dogWhy we should get a dog
Why we should get a dog
 
E&TR A5 4pp Get Involved - Web
E&TR A5 4pp Get Involved - WebE&TR A5 4pp Get Involved - Web
E&TR A5 4pp Get Involved - Web
 
Top 8 choir director resume samples
Top 8 choir director resume samplesTop 8 choir director resume samples
Top 8 choir director resume samples
 
Advertisements and Children
Advertisements and ChildrenAdvertisements and Children
Advertisements and Children
 
parodia sobre a agua
parodia sobre a aguaparodia sobre a agua
parodia sobre a agua
 
Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen
Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen
Ilmiöt – oppimistehtävät ja ilmiöpohjaisen oppimisen tunnistaminen
 

Similar to Unit 7 - Password Policies and Procedures - Babeli

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfChinatu Uzuegbu
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
So Many Passwords So Little Mind
So Many Passwords So Little MindSo Many Passwords So Little Mind
So Many Passwords So Little MindAlain Lemay
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 

Similar to Unit 7 - Password Policies and Procedures - Babeli (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
W make107
W make107W make107
W make107
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
 
Password management
Password managementPassword management
Password management
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
So Many Passwords So Little Mind
So Many Passwords So Little MindSo Many Passwords So Little Mind
So Many Passwords So Little Mind
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 

More from Lianna Babeli

Unit 10 Assignment - Long Lesson - Babeli
Unit 10 Assignment - Long Lesson - BabeliUnit 10 Assignment - Long Lesson - Babeli
Unit 10 Assignment - Long Lesson - BabeliLianna Babeli
 
Unit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - BabeliUnit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - BabeliLianna Babeli
 
Unit 11 Project - Team Dude & Dudette
Unit 11 Project - Team Dude & DudetteUnit 11 Project - Team Dude & Dudette
Unit 11 Project - Team Dude & DudetteLianna Babeli
 
Unit 5 Project - Babeli
Unit 5 Project - BabeliUnit 5 Project - Babeli
Unit 5 Project - BabeliLianna Babeli
 
Unit 11 - Assignment B - Babeli
Unit 11 - Assignment B - BabeliUnit 11 - Assignment B - Babeli
Unit 11 - Assignment B - BabeliLianna Babeli
 
Project Conclusion - Babeli
Project Conclusion - BabeliProject Conclusion - Babeli
Project Conclusion - BabeliLianna Babeli
 

More from Lianna Babeli (7)

Unit 10 Assignment - Long Lesson - Babeli
Unit 10 Assignment - Long Lesson - BabeliUnit 10 Assignment - Long Lesson - Babeli
Unit 10 Assignment - Long Lesson - Babeli
 
Unit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - BabeliUnit 11 - Final Project - Threat & Risk Assessment - Babeli
Unit 11 - Final Project - Threat & Risk Assessment - Babeli
 
Unit 11 Project - Team Dude & Dudette
Unit 11 Project - Team Dude & DudetteUnit 11 Project - Team Dude & Dudette
Unit 11 Project - Team Dude & Dudette
 
Unit 5 Project - Babeli
Unit 5 Project - BabeliUnit 5 Project - Babeli
Unit 5 Project - Babeli
 
Unit 11 - Assignment B - Babeli
Unit 11 - Assignment B - BabeliUnit 11 - Assignment B - Babeli
Unit 11 - Assignment B - Babeli
 
Unit 8 - Project
Unit 8 - ProjectUnit 8 - Project
Unit 8 - Project
 
Project Conclusion - Babeli
Project Conclusion - BabeliProject Conclusion - Babeli
Project Conclusion - Babeli
 

Unit 7 - Password Policies and Procedures - Babeli

  • 1. USED WITH PERMISSION FROM THE OWNER OF INFINITE VAPOR Lianna Babeli | Operating Systems I | February 23, 2014 Strong Passwords POLICIES & PROCEDURES
  • 2. LIANNA BABELI 1 1 Password Policies For Infinite Vapor All employees, including executive staff, should use strong passwords that help defend against malicious and unauthorized intrusion on all company systems, including all websites, end user accounts, and systems which require a password for login that is designed for the business. All employees, including executive staff, should remember to utilize a password that does not include any personal information, easily researchable information concerning one’s social life, and should be as random as possible. This significantly reduces the chances of a malicious or unauthorized user from attempting to gain access to any company digital system resources. The more complex the password involved, within the allowed parameters of the systems, the less likely it is that an intruder will gain access. A strong password should include eight characters or longer, with at least one of the following: uppercase and lowercase letters, numerals (numbers), punctuation marks, and symbols. The password should be something simple enough to remember, but complex enough that cannot be easily randomized or easily researched. All employees, including executive staff, may not share their passwords with others without authorization from the individuals and a manager. Do not store
  • 3. LIANNA BABELI 2 2 passwords on the devices that the passwords protect. Keep a digital and physical, written, copy of your passwords in multiple safe and trusted locations. For example, keep a notepad with all your passwords on your person or in a secure location such as a safe or business locker. Utilize your cellphone’s file encryption to protect certain apps which may contain passwords OR use a very well-secured password organizing app. If you store your company passwords at home on your home system, make sure that these are as encrypted and secure as the ones you might utilize while at work. Do NOT share passwords with anyone who is NOT an employee of the company. No exceptions to this rule! Examples that meet the criteria for strong passwords are:  NaS043$3!@  J3r3m?132  <4p1Ng!$350 These are complex, very random passwords that will be relatively easy to remember while having at least 8 characters, including upper and lowercase alphabetical characters, at least one numerical, at least one punctuation mark, and at least one symbol. They have no relation to an individual or to anything personal or company related. Examples that do not meet the criteria for strong passwords are:
  • 4. LIANNA BABELI 3 3  jenniferb  mydogbennie  mywife1982 These are passwords that are very simple and could be easily discovered or randomly generated by a hacker without even trying. The only thing these have going for them is that they are more than 8 characters and that the last one uses several numericals. Using employee names, family members, or anniversary dates are a very bad idea. Any questions or concerns about password design and protection should contact the IT Manager of your store or the Director of IT within the company as a whole. If you cannot find this individual, ask your Managers for the appropriate contact or make sure that they can provide a copy of this policy and procedures handbook. Thank you for choosing to work at Infinite Vapor and have fun at work!