SlideShare a Scribd company logo
1 of 34
presents:
                          Passwords

       Information quoted directly and paraphrased from
     “Security Awareness” from the University of Texas at
           Austin’s Information Technology Services
       http://www.utexas.edu/its/secure/articles/keep_safe_with_strong_passwords.php
To protect your computer, your data and
     your online accounts, make a strong
     password your first line of defense.
Flickr CC Photo by Bruno Santos: http://www.flickr.com/photos/bsantos/50283672
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1750378617


                                                                                     Most people
Info from University of Texas at Austin’s Information Technology Services




                                                                                     know that
                                                                                     strong
                                                                                     passwords
                                                                                     are a good
                                                                                     idea, but don’t
                                                                                     realize
                                                                                     hackers are
                                                                                     becoming
                                                                                     increasingly
                                                                                     sophisticated
                                                                                     at password
                                                                                     “cracking.”
Flickr CC Photo by Pieter Ouwerkerk: http://www.flickr.com/photos/pieterouwerkerk/699483014
Info from University of Texas at Austin’s Information Technology Services



                                                                                              You have to
                                                                                              change your
                                                                                              password
                                                                                              frequently, and
                                                                                              stay aware of
                                                                                              what techniques
                                                                                              hackers are
                                                                                              using to steal
                                                                                              passwords, if
                                                                                              you want to stay
                                                                                              ahead of the bad
                                                                                              guys.
Internet security is based on a “weakest link”
     principle, and passwords are often the only
     thing standing between a hacker and access to
     your computer or a campus network.




Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338
Info from University of Texas at Austin’s Information Technology Services
If your password is weak, you make it easier for
    someone to break in.




Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338
Info from University of Texas at Austin’s Information Technology Services
Hackers make their livelihood
                      by automating ways to
                      continually search out the
                      weakest link to gain access to a
                      network or computer.




               Don’t let your password be the
                weak link!
Flickr CC Photo by Treyvor Leyenhorst: http://www.flickr.com/photos/10213764@N02/1485773850Info from
University of Texas at Austin’s Information Technology Services
There are real consequences to not having a
                  strong password.

                  If someone steals your password, they may find
                  a way to access your e-mail or IM messages,
                  your bank accounts, your research, your contact
                  lists and whatever else you have on your
                  computer.
Flickr CC Photo by Angel Arcones: http://www.flickr.com/photos/freddy-click-boy/3303542092
Info from University of Texas at Austin’s Information Technology Services
Your files may be altered or destroyed.
                   Sometimes hackers even take over a
                   computer and turn it into a zombie,
                   using it to perform malicious tasks such
                   as sending out large amounts of spam.

Flickr CC Photo by Thomas Hawk: http://www.flickr.com/photos/thomashawk/362270357
Info from University of Texas at Austin’s Information Technology Services
How Passwords Are Stolen
When you are creating a strong
password, it can help to know the
tactics hackers use to steal them.

The following are some of the most
frequently used techniques:
Flickr CC Photo by Eric Schmuttenmaer: http://www.flickr.com/photos/akeg/2175038829
Info from University of Texas at Austin’s Information Technology Services




                                                                        Guessing
               Programs designed to guess a user’s password are
               common. They often use personal information found
               online—such as names, birth dates, names of friends or
               significant others, pet names or license plate numbers—
               as a starting point.

             These programs can even search for a word spelled
             backwards.




                                                                              STOLEN
                                                                                      ?
TIP: It’s best to
                                                                                    steer clear of any
                                                                                    personally
                                                                                    identifying
                                                                                    information when
                                                                                    creating a
                                                                                    password.


Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by David Glover: http://www.flickr.com/photos/davidglover/4269594949
Info from University of Texas at Austin’s Information Technology Services




                               Dictionary-based attacks
                      Programs and software also exist that
                      run every word in a dictionary or word
                      list against a user name in hopes of
                      finding a perfect match.
TIP: Staying away
                                                                                    from actual words,
                                                                                    even in a foreign
                                                                                    language, is
                                                                                    recommended.



Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
“Brute Force” attacks
                                                                                       By trying every
                                                                                      conceivable combination
                                                                                      of key strokes in tandem
                                                                                      with a user name, brute
                                                                                      force attacks often
                                                                                      discover the correct
                                                                                      password.

                                                                                      Programs can execute a
                                                                                      brute force attack very
                                                                                      quickly.
Flickr CC Photo by Alex Eylar: http://www.flickr.com/photos/hoyvinmayvin/4687336568
Info from University of Texas at Austin’s Information Technology Services
TIP: The best way
                                                                                    to beat such an
                                                                                    attack is with a
                                                                                    long, complex
                                                                                    password that
                                                                                    uses upper and
                                                                                    lower case letters,
                                                                                    numbers, special
                                                                                    characters and
                                                                                    punctuation
                                                                                    marks.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
Phishing

               Phishing scams usually try to hook you with
               an urgent IM or e-mail message designed to
               alarm or excite you into responding.

               These messages often appear to be from a
               friend, bank or other legitimate source
               directing you to phony Web sites designed to
               trick you into providing personal information,
               such as your user name and password.
Flickr CC Photo by Widjaya Ivan: http://www.flickr.com/photos/28288673@N07/6457165789
Info from University of Texas at Austin’s Information Technology Services
TIP: Don’t click a
                                                                                    link in any
                                                                                    suspicious e-
                                                                                    mails, and don’t
                                                                                    provide your
                                                                                    information
                                                                                    unless you trust
                                                                                    the source.


Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
“Shoulder surfing”

                 Passwords are not always
                 stolen online. A hacker
                 who is lurking around in a
                 computer lab, cybercafé
                 or library may be there for
                 the express purpose of
                 watching you enter your
                 user name and password
                 into a computer.
Flickr CC Photo by tanakawho: http://www.flickr.com/photos/28481088@N00/425099204
Info from University of Texas at Austin’s Information Technology Services
TIP: Try to enter
                                                                                    your passwords
                                                                                    quickly, without
                                                                                    looking at the
                                                                                    keyboard, as a
                                                                                    defense against
                                                                                    this type of theft.



Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234
Info from University of Texas at Austin’s Information Technology Services
Tips for Creating and Using
                           Safe Passwords




Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/688068169
Info from University of Texas at Austin’s Information Technology Services
Use BOTH
                                                                                              upper- and
                                                                                              lower-case
                                                                                              letters.




Flickr CC Photo by Nina Stössinger: http://www.flickr.com/photos/ninastoessinger/4179518104
Info from University of Texas at Austin’s Information Technology Services
Place numbers and punctuation marks
                        randomly in your password.




Flickr CC Photo by Lali Masriera: http://www.flickr.com/photos/visualpanic/856235055
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by Jason Pearce: http://www.flickr.com/photos/jasonpearce/4750110576
Info from University of Texas at Austin’s Information Technology Services




                      Make your password long and complex,
                      so it is hard to crack. Between 8 to 20
                      characters long is recommended.
Use one or more of these special
                  characters:
                   !@#$%*()-+=,<>::“‘




Info from University of Texas at Austin’s Information Technology Services
To help you easily remember your
                      password, consider using a phrase or a
                      song title as a password. For example,
                      “Somewhere Over the Rainbow”
                      becomes “Sw0tR8nBO” or “Smells Like
                      Teen Spirit” becomes “sMll10nspT.”




Flickr CC Photo by marc falardeau: http://www.flickr.com/photos/49889874@N05/6101434856
Info from University of Texas at Austin’s Information Technology Services
Make your password easy to type
                    quickly. This will make it harder for
                    someone looking over your shoulder to
                    steal it.




Flickr CC Photo by Chris Metcalf: http://www.flickr.com/photos/laffy4k/441037582
Info from University of Texas at Austin’s Information Technology Services
Using your password safely
                                                                                     Create different
                                                                                     passwords for
                                                                                     different
                                                                                     accounts and
                                                                                     applications.
                                                                                     That way, if one
                                                                                     account is
                                                                                     breached, your
                                                                                     other accounts
                                                                                     won’t be put at
                                                                                     risk too.
Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1454251440
Info from University of Texas at Austin’s Information Technology Services
Change your
            passwords
            regularly, about
            once every six
            months.

            (Daylight
            Savings Time?)


Flickr CC Photo by Eliazar Parra Cardenas: http://www.flickr.com/photos/eliazar/407591133
Info from University of Texas at Austin’s Information Technology Services
Flickr CC Photo by Mike Fernwood: http://www.flickr.com/photos/ultimateslug/326930489
Info from University of Texas at Austin’s Information Technology Services




                      Don’t share your password with
                      anyone else. Once it’s out of your
                      control, so is your security.
Never enable the “Save Password”
                 option, even if prompted to do so.

                 Pre-saved passwords make it easy for
                 anyone else using your computer to
                 access your accounts.

http://www.rhsmith.umd.edu/portal/portal_help.html
Info from University of Texas at Austin’s Information Technology Services
Be especially
               careful about
               saving
               passwords in
               web browsers.




http://www.webdevelopersnotes.com/how-do-i/clear-
browsing-data-google-chrome.php
Never walk away from
                                                                                a shared computer
                                                                                without logging off.
                                                                                This will ensure no
                                                                                other users can
                                                                                access your accounts.



Flickr CC Photo by Totumweb: http://www.flickr.com/photos/totumweb/5601416590
Info from University of Texas at Austin’s Information Technology Services
Don’t use sample passwords given on
                  different Web sites, including this one.




                               “Somewhere Over the Rainbow”
                               becomes “Sw0tR8nBO” or
                               “Smells Like Teen Spirit” becomes
                               “sMll10nspT.”



Info from University of Texas at Austin’s Information Technology Services

More Related Content

Similar to Passwords and Digital Safety (16)

Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptxa95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 

More from sraslim (6)

Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
 
Sonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer PresentationSonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer Presentation
 
Setting privacy controls on social networks
Setting privacy controls on social networksSetting privacy controls on social networks
Setting privacy controls on social networks
 
Inspiring Students
Inspiring StudentsInspiring Students
Inspiring Students
 
Livebinders Guide
Livebinders GuideLivebinders Guide
Livebinders Guide
 
Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Passwords and Digital Safety

  • 1. presents: Passwords Information quoted directly and paraphrased from “Security Awareness” from the University of Texas at Austin’s Information Technology Services http://www.utexas.edu/its/secure/articles/keep_safe_with_strong_passwords.php
  • 2. To protect your computer, your data and your online accounts, make a strong password your first line of defense. Flickr CC Photo by Bruno Santos: http://www.flickr.com/photos/bsantos/50283672 Info from University of Texas at Austin’s Information Technology Services
  • 3. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1750378617 Most people Info from University of Texas at Austin’s Information Technology Services know that strong passwords are a good idea, but don’t realize hackers are becoming increasingly sophisticated at password “cracking.”
  • 4. Flickr CC Photo by Pieter Ouwerkerk: http://www.flickr.com/photos/pieterouwerkerk/699483014 Info from University of Texas at Austin’s Information Technology Services You have to change your password frequently, and stay aware of what techniques hackers are using to steal passwords, if you want to stay ahead of the bad guys.
  • 5. Internet security is based on a “weakest link” principle, and passwords are often the only thing standing between a hacker and access to your computer or a campus network. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338 Info from University of Texas at Austin’s Information Technology Services
  • 6. If your password is weak, you make it easier for someone to break in. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/2379761338 Info from University of Texas at Austin’s Information Technology Services
  • 7. Hackers make their livelihood by automating ways to continually search out the weakest link to gain access to a network or computer. Don’t let your password be the weak link! Flickr CC Photo by Treyvor Leyenhorst: http://www.flickr.com/photos/10213764@N02/1485773850Info from University of Texas at Austin’s Information Technology Services
  • 8. There are real consequences to not having a strong password. If someone steals your password, they may find a way to access your e-mail or IM messages, your bank accounts, your research, your contact lists and whatever else you have on your computer. Flickr CC Photo by Angel Arcones: http://www.flickr.com/photos/freddy-click-boy/3303542092 Info from University of Texas at Austin’s Information Technology Services
  • 9. Your files may be altered or destroyed. Sometimes hackers even take over a computer and turn it into a zombie, using it to perform malicious tasks such as sending out large amounts of spam. Flickr CC Photo by Thomas Hawk: http://www.flickr.com/photos/thomashawk/362270357 Info from University of Texas at Austin’s Information Technology Services
  • 10. How Passwords Are Stolen When you are creating a strong password, it can help to know the tactics hackers use to steal them. The following are some of the most frequently used techniques:
  • 11. Flickr CC Photo by Eric Schmuttenmaer: http://www.flickr.com/photos/akeg/2175038829 Info from University of Texas at Austin’s Information Technology Services Guessing Programs designed to guess a user’s password are common. They often use personal information found online—such as names, birth dates, names of friends or significant others, pet names or license plate numbers— as a starting point. These programs can even search for a word spelled backwards. STOLEN ?
  • 12. TIP: It’s best to steer clear of any personally identifying information when creating a password. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 13. Flickr CC Photo by David Glover: http://www.flickr.com/photos/davidglover/4269594949 Info from University of Texas at Austin’s Information Technology Services Dictionary-based attacks Programs and software also exist that run every word in a dictionary or word list against a user name in hopes of finding a perfect match.
  • 14. TIP: Staying away from actual words, even in a foreign language, is recommended. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 15. “Brute Force” attacks By trying every conceivable combination of key strokes in tandem with a user name, brute force attacks often discover the correct password. Programs can execute a brute force attack very quickly. Flickr CC Photo by Alex Eylar: http://www.flickr.com/photos/hoyvinmayvin/4687336568 Info from University of Texas at Austin’s Information Technology Services
  • 16. TIP: The best way to beat such an attack is with a long, complex password that uses upper and lower case letters, numbers, special characters and punctuation marks. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 17. Phishing Phishing scams usually try to hook you with an urgent IM or e-mail message designed to alarm or excite you into responding. These messages often appear to be from a friend, bank or other legitimate source directing you to phony Web sites designed to trick you into providing personal information, such as your user name and password. Flickr CC Photo by Widjaya Ivan: http://www.flickr.com/photos/28288673@N07/6457165789 Info from University of Texas at Austin’s Information Technology Services
  • 18. TIP: Don’t click a link in any suspicious e- mails, and don’t provide your information unless you trust the source. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 19. “Shoulder surfing” Passwords are not always stolen online. A hacker who is lurking around in a computer lab, cybercafé or library may be there for the express purpose of watching you enter your user name and password into a computer. Flickr CC Photo by tanakawho: http://www.flickr.com/photos/28481088@N00/425099204 Info from University of Texas at Austin’s Information Technology Services
  • 20. TIP: Try to enter your passwords quickly, without looking at the keyboard, as a defense against this type of theft. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/397004234 Info from University of Texas at Austin’s Information Technology Services
  • 21. Tips for Creating and Using Safe Passwords Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/688068169 Info from University of Texas at Austin’s Information Technology Services
  • 22. Use BOTH upper- and lower-case letters. Flickr CC Photo by Nina Stössinger: http://www.flickr.com/photos/ninastoessinger/4179518104 Info from University of Texas at Austin’s Information Technology Services
  • 23. Place numbers and punctuation marks randomly in your password. Flickr CC Photo by Lali Masriera: http://www.flickr.com/photos/visualpanic/856235055 Info from University of Texas at Austin’s Information Technology Services
  • 24. Flickr CC Photo by Jason Pearce: http://www.flickr.com/photos/jasonpearce/4750110576 Info from University of Texas at Austin’s Information Technology Services Make your password long and complex, so it is hard to crack. Between 8 to 20 characters long is recommended.
  • 25. Use one or more of these special characters: !@#$%*()-+=,<>::“‘ Info from University of Texas at Austin’s Information Technology Services
  • 26. To help you easily remember your password, consider using a phrase or a song title as a password. For example, “Somewhere Over the Rainbow” becomes “Sw0tR8nBO” or “Smells Like Teen Spirit” becomes “sMll10nspT.” Flickr CC Photo by marc falardeau: http://www.flickr.com/photos/49889874@N05/6101434856 Info from University of Texas at Austin’s Information Technology Services
  • 27. Make your password easy to type quickly. This will make it harder for someone looking over your shoulder to steal it. Flickr CC Photo by Chris Metcalf: http://www.flickr.com/photos/laffy4k/441037582 Info from University of Texas at Austin’s Information Technology Services
  • 28. Using your password safely Create different passwords for different accounts and applications. That way, if one account is breached, your other accounts won’t be put at risk too. Flickr CC Photo by Darwin Bell: http://www.flickr.com/photos/darwinbell/1454251440 Info from University of Texas at Austin’s Information Technology Services
  • 29. Change your passwords regularly, about once every six months. (Daylight Savings Time?) Flickr CC Photo by Eliazar Parra Cardenas: http://www.flickr.com/photos/eliazar/407591133 Info from University of Texas at Austin’s Information Technology Services
  • 30. Flickr CC Photo by Mike Fernwood: http://www.flickr.com/photos/ultimateslug/326930489 Info from University of Texas at Austin’s Information Technology Services Don’t share your password with anyone else. Once it’s out of your control, so is your security.
  • 31. Never enable the “Save Password” option, even if prompted to do so. Pre-saved passwords make it easy for anyone else using your computer to access your accounts. http://www.rhsmith.umd.edu/portal/portal_help.html Info from University of Texas at Austin’s Information Technology Services
  • 32. Be especially careful about saving passwords in web browsers. http://www.webdevelopersnotes.com/how-do-i/clear- browsing-data-google-chrome.php
  • 33. Never walk away from a shared computer without logging off. This will ensure no other users can access your accounts. Flickr CC Photo by Totumweb: http://www.flickr.com/photos/totumweb/5601416590 Info from University of Texas at Austin’s Information Technology Services
  • 34. Don’t use sample passwords given on different Web sites, including this one. “Somewhere Over the Rainbow” becomes “Sw0tR8nBO” or “Smells Like Teen Spirit” becomes “sMll10nspT.” Info from University of Texas at Austin’s Information Technology Services