1 / 40

PowerPoint Presentation - Information Security Management

Faraday
Download Presentation

PowerPoint Presentation - Information Security Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    13. Passwords Simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network Virtually ineffective if people do not protect their passwords. The golden rules, or policies for passwords are: Make passwords as meaningless as possible Change passwords regularly Never divulge passwords to anyone UA Password Standard http://security.arizona.edu/drafts.html

    14. Now let's talk about making a better, stronger password. (click) (discuss any of these if necessary) - Don't use names (click) - Don't use personal information (click) - Don't use words found in a dictionary (click) - Use at least eight characters The longer the password is, the harder it is for a person or program to guess. (click) - Use both letters and numbers This greatly increases the possible combinations of characters. (click) - Use special characters if possible A valuable added strength if your system allows them. (click) - Use upper and lower case letters This doubles the possible combination and makes a password exponentially stronger. (click) - combine misspelled words This helps protect against a dictionary type program attack. (go to next screen)Now let's talk about making a better, stronger password. (click) (discuss any of these if necessary) - Don't use names (click) - Don't use personal information (click) - Don't use words found in a dictionary (click) - Use at least eight characters The longer the password is, the harder it is for a person or program to guess. (click) - Use both letters and numbers This greatly increases the possible combinations of characters. (click) - Use special characters if possible A valuable added strength if your system allows them. (click) - Use upper and lower case letters This doubles the possible combination and makes a password exponentially stronger. (click) - combine misspelled words This helps protect against a dictionary type program attack. (go to next screen)

    19. It's probably safer to store a strong password in a place where someone would have to physically break in than to expose a weak password to 300,000,000 people on the internet.

    20. Safeguard Your Strong Password Be careful about typing your password into a strange computer. Is the owner trustworthy or are they perhaps running a keyboard logger recording your keystrokes? (It has happened). Who was the last person to use it and what did they run on it?

    21. Be careful about typing your password into a strange program, web site, or server. Why do they need it? Are they authorized to ask for it? A web site on the other side of the country should definitely not be asking for your U of A password over the network whenever possible. Do not use the same password on an unofficial, entertainment, off-campus, OR uncritical service that you use for more critical services.

More Related