Presented by :Zaki Anwer
Presented to : Mr.Anil Dangi
(Assistant Professor)
Enrolment No: MUR1800949
Roll No :180100110042
Course: : B.Tech (CSE)7th sem
 .1Password Strength:-The more complex
password is the more difficult it becomes to hack. Hacker
has dozen of tools which try out the most used password
in order to gain access. Here is a list of most used
password.
Example:-
12345 abcd
76657 aaaa
Password I love you
1111111 adop1
2. Strong Password:-
-Choose at least 15-10 characters
-Choose uppercase letter
- Choose lowercase letter
-Choose numbers
-Choose special characters such as “! @ # $ % & * ? /~ {[}] <>
-is not like previous name
-is not your name
-is not Friend’s name
-is not your family members name
-is not dictionary word
-After five time failed login attempts, Password should be locked
for several hours.
3.Change Password Periodically:- The
longer use the same password ,the hackers chances becomes of
someone gets their hands on it. Some website give us the option
of remind us every few moth to change your passwords, other
even force it. Using the same password for a long time in case
the will be risk.
-Change password within 45to 60 days
-whole new password formula based
-Getting phased
- key logged
4. Backup Password:- It best not to records your
password , but with all different kind of accounts as password it
becomes inevitable to store them some where safe. In any case
write them down on paper or save them in a notepad (with any
encryption )
Once good option would be use a password spreadsheet (Excel
library office)
5. Security Question:- Security question are one
common way of recovering forgotten password ,but it’s also one of
most unsafe once .Most people tend to answer there question truth
fully ,which can easily be gassed by someone who looks at your face
book profile .
Question like what's your name first name?
Where are you born ? Can easily be found , I suggest you either don't
set there upper also use some kind of password for these answer.
Best way of recovery your forgotten password would be.
-always use another phone number
-use another email id
6.Password Management Tools:- There
are utilities which helps store you password and automatically
fill them on the corresponding login screen (application or
website ). I don't prefer using these ,but if you decided to use
them stick to the ones that are open source that way you are
sure the content of the application is checked by indolence
parties and its vary safe to use.
-Pass safe
-key safe
-last pass
.7 Browser Saving Password:- Almost all
browser give the option of storing the login information of the website
you visit .There is no problem with using this ,if you also secure
accessing the computer where this is enabled .
For example if you use four five ,all password can easily shown.
Anyone who has access your computer so you need to make sure that
your computer account is password protected and when leave your
computer it’s locked . In windows you can easily lock your
computer by press & holding the with key + “L” key.
8. Instant of Password:-
One-time password –User are given a device that
generates a new password at certain intervals which is
keyed with authentication server.
Challenge response scheme
 Biometrics
zaki_anwer_cryptography.pptx

zaki_anwer_cryptography.pptx

  • 1.
    Presented by :ZakiAnwer Presented to : Mr.Anil Dangi (Assistant Professor) Enrolment No: MUR1800949 Roll No :180100110042 Course: : B.Tech (CSE)7th sem
  • 3.
     .1Password Strength:-Themore complex password is the more difficult it becomes to hack. Hacker has dozen of tools which try out the most used password in order to gain access. Here is a list of most used password. Example:- 12345 abcd 76657 aaaa Password I love you 1111111 adop1
  • 4.
    2. Strong Password:- -Chooseat least 15-10 characters -Choose uppercase letter - Choose lowercase letter -Choose numbers -Choose special characters such as “! @ # $ % & * ? /~ {[}] <> -is not like previous name -is not your name -is not Friend’s name -is not your family members name -is not dictionary word -After five time failed login attempts, Password should be locked for several hours.
  • 5.
    3.Change Password Periodically:-The longer use the same password ,the hackers chances becomes of someone gets their hands on it. Some website give us the option of remind us every few moth to change your passwords, other even force it. Using the same password for a long time in case the will be risk. -Change password within 45to 60 days -whole new password formula based -Getting phased - key logged
  • 6.
    4. Backup Password:-It best not to records your password , but with all different kind of accounts as password it becomes inevitable to store them some where safe. In any case write them down on paper or save them in a notepad (with any encryption ) Once good option would be use a password spreadsheet (Excel library office)
  • 7.
    5. Security Question:-Security question are one common way of recovering forgotten password ,but it’s also one of most unsafe once .Most people tend to answer there question truth fully ,which can easily be gassed by someone who looks at your face book profile . Question like what's your name first name? Where are you born ? Can easily be found , I suggest you either don't set there upper also use some kind of password for these answer. Best way of recovery your forgotten password would be. -always use another phone number -use another email id
  • 8.
    6.Password Management Tools:-There are utilities which helps store you password and automatically fill them on the corresponding login screen (application or website ). I don't prefer using these ,but if you decided to use them stick to the ones that are open source that way you are sure the content of the application is checked by indolence parties and its vary safe to use. -Pass safe -key safe -last pass
  • 9.
    .7 Browser SavingPassword:- Almost all browser give the option of storing the login information of the website you visit .There is no problem with using this ,if you also secure accessing the computer where this is enabled . For example if you use four five ,all password can easily shown. Anyone who has access your computer so you need to make sure that your computer account is password protected and when leave your computer it’s locked . In windows you can easily lock your computer by press & holding the with key + “L” key.
  • 10.
    8. Instant ofPassword:- One-time password –User are given a device that generates a new password at certain intervals which is keyed with authentication server. Challenge response scheme  Biometrics