Preview

Password Security

Satisfactory Essays
Open Document
Open Document
262 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Security
PASSWORD SECURITY
By Wendell Taylor

AGENDA
• Introduction
• What is
• How to
• Pro/con
• Conclusion
• Reference

PASSWORD
• Password- A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access.
• Mark Brunett study (Xato.net)
91% of all passwords are one of the 1,000 most common
40% of all keys used are one of just 100 commonly used passwords.
71% of all keys being used are in the most common 500 words

GOOD PASSWORD


Use both upper- and lower-case letters



Incorporate numbers or punctuation marks




Use at least one of these special characters: ! @ # $ % * ( ) - + = , < >
::“‘.
Make it at least 8 characters long.



A strong password does NOT, in any way, use your personal information, such as name, phone number, Social Security number, birth date, address or names of anyone you know.



Come up with something you can remember easily, but would be virtually impossible for anyone else to guess.

PRO/CON
Pro of Strong Password




Can not be hack



Information easily access


Online account Secured





Con of Weak Password



Less stress

Identity intact

Information and sensitive material are safe



Identity theft

Privacy is evaded
Change information



Sensitive Material

CONCLUSION
• Password
• Strong password
• Pro/Con
Treat your Password like your toothbrush, never let somebody else use it and change it every six month.

REFERENCE
• http://www.rainbow.com/library/5/04-28-03N+IPasswordPR.pdf
• http://www.sims.berkeley.edu/~ sinha/teaching/Infosys271_2000/Passwords/index.html • http://www.cio.com/info/releases/020702_release.html

You May Also Find These Documents Helpful

  • Powerful Essays

    BA Outline

    • 12627 Words
    • 51 Pages

    !" #$%&'()*#+#,-**!" ! #$%&'()$*&# "./012#"234 +" ,-.$/*0/*$1//23"4"/5&%6&%.$*/8.%$#3%0-*67/995: ."…

    • 12627 Words
    • 51 Pages
    Powerful Essays
  • Powerful Essays

    Java Chapter 2 Quiz

    • 2047 Words
    • 9 Pages

    The first character must be one of the letters a–z, A–Z, and underscore or a dollar sign.…

    • 2047 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Mla Quiz

    • 507 Words
    • 3 Pages

    | . (10-15) - The direct quotation ends with a period. Then a space and then type the parenthetical without a period at the end.…

    • 507 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security Plan

    • 492 Words
    • 2 Pages

    • Content filtering and anti-virus scanning of all incoming data. Quarantine of unknown file types.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To appease the client she offers to have the account locked until the client is ready to access the account.…

    • 108 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Physical Security

    • 848 Words
    • 4 Pages

    The Bloom Design Group is a company that offers interior design services to businesses and individuals throughout the world. Bloom has a corporate office in New York and a second office in Los Angeles. The company’s Web site features a virtual decorating tool, which offers clients the chance to play with different color and design schemes. This tool allows their clients to get an idea of what a design project would look like once it is completed, before actually making color and design decisions. The Web site also gives interior designers access to their client files and company style guides, as well as the ability to electronically process orders for design materials and furniture. The designers use a secure login and a password to gain access to the Web site and its features. The company 's workforce spends all its time working remotely and accessing the corporate network using a secure VPN.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Securing Sensitive Items

    • 1514 Words
    • 7 Pages

    Sensitive Items is a range of items which varies from those which are essential to the mission to those which contain information which is sensitive in nature (i.e. giving access to secure communication, movement of troops, their equipment, support lines or the general idea of the mission.) There are many reasons these items need to be secure and accountability maintained for them. Some of these reasons include the potential to pose a threat to mission success if fallen into the wrong hands, the ability to complete the mission if not maintained by the troops themselves, the security of those around you if not maintained, and the ease and flow with which the mission must go on to be effective.…

    • 1514 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1:1 the welfare requirements and guidance of the relevant EYFS are put in place to provide information and advice designed to help practitioners meet these legal requirements in ways that reflects the needs of the individual children in their care and is appropriate to their setting.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    One Time password protection

    • 3022 Words
    • 13 Pages

    3. OTP Authentication to an OTP-protected Network via SSL VPN over ZyWALL USG ................................. 11…

    • 3022 Words
    • 13 Pages
    Good Essays
  • Good Essays

    Alternatives to Passwords

    • 800 Words
    • 4 Pages

    Logging in using user names and passwords are by far the most common way to access modern computer systems. However as we have seen these old methods of user authentication are susceptible to social engineering and new social networks have made this all the more easier. Luckily there are a few alternatives. These include Imaging, security combinations and Biometrics.…

    • 800 Words
    • 4 Pages
    Good Essays