E N D
13. Passwords Simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network
Virtually ineffective if people do not protect their passwords.
The golden rules, or policies for passwords are:
Make passwords as meaningless as possible
Change passwords regularly
Never divulge passwords to anyone
UA Password Standard
http://security.arizona.edu/drafts.html
14. Now let's talk about making a better, stronger password.
(click)
(discuss any of these if necessary)
- Don't use names
(click)
- Don't use personal information
(click)
- Don't use words found in a dictionary
(click)
- Use at least eight characters
The longer the password is, the harder it is for a person or program to guess.
(click)
- Use both letters and numbers
This greatly increases the possible combinations of characters.
(click)
- Use special characters if possible
A valuable added strength if your system allows them.
(click)
- Use upper and lower case letters
This doubles the possible combination and makes a password exponentially stronger.
(click)
- combine misspelled words
This helps protect against a dictionary type program attack.
(go to next screen)Now let's talk about making a better, stronger password.
(click)
(discuss any of these if necessary)
- Don't use names
(click)
- Don't use personal information
(click)
- Don't use words found in a dictionary
(click)
- Use at least eight characters
The longer the password is, the harder it is for a person or program to guess.
(click)
- Use both letters and numbers
This greatly increases the possible combinations of characters.
(click)
- Use special characters if possible
A valuable added strength if your system allows them.
(click)
- Use upper and lower case letters
This doubles the possible combination and makes a password exponentially stronger.
(click)
- combine misspelled words
This helps protect against a dictionary type program attack.
(go to next screen)
19. It's probably safer to store a strong password in a place where someone would have to physically break in than to expose a weak password to 300,000,000 people on the internet.
20. Safeguard Your Strong Password Be careful about typing your password into a strange computer.
Is the owner trustworthy or are they perhaps running a keyboard logger recording your keystrokes? (It has happened).
Who was the last person to use it and what did they run on it?
21. Be careful about typing your password into a strange program, web site, or server.
Why do they need it?
Are they authorized to ask for it?
A web site on the other side of the country should definitely not be asking for your U of A password over the network whenever possible.
Do not use the same password on an unofficial, entertainment, off-campus, OR uncritical service that you use for more critical services.