SlideShare una empresa de Scribd logo
1 de 9
Passwords – Back to Basics!
Michael McKinnon, AVG (AU/NZ) Security Advisor
mmckinnon@avg.com.au




               An Avalanche Technology Group Company
What is a Password?




What should we aim for in a password?

• Should be easy to remember

• Should be hard to guess




                                        2
World’s Top 10 Most Used Passwords

• 123456              • 12345

• 123456789           • Password123

• Password            • 1234567

• 12345678            • abc123

• 654321              • Qwerty




                                      3
Can someone guess your password?




          • Favourite Football Team?
          • Pet‟s Name?
          • Family Members?



                                       4
Rank these Password in order of Strength…


1. E56#av+Yb!

2. Password123

3. aaaaaAAAAA#####43   MOST SECURE

4. 123456

5. lucasjames




                                            5
Why? Anatomy of a good Password

• The password: aaaaaAAAAA#####43

• It is 17 characters in length

• Contains upper and lowercase letters

• Contains numbers

• Contains the „#‟ symbol

• How many combinations?

    • 72 combinations, 17 combinations long is 72^17

    • That‟s 37 thousand billion billion billion combinations!!




                                                                  6
The Golden Rules of Passwords

• Never, never, ever give your password to someone else!

• Absolute minimum of 10 characters

• Use a combination of different characters

   • upper and lowercase (a – z, A – Z)

   • at least one numeral ( 0 – 9 )

   • at least one symbol ( !@#$%^&*()_+= )

• Password length is always better than randomness

• Must be easy to remember




                                                           7
Password Separation – Neat Tricks!

• Make new passwords for different accounts you access…

• Start with your “base” password (aaaaaAAAAA#####43)

   • “Facebook” – you could take the letters “f” and “b” from Face
     Book and create a new password:
       • aaaaaAAAAA#####43fb

   • “Twitter” – you could take the letters “t” and “r” from
     Twitter and create another password:
       • aaaaaAAAAA#####43tr

• Mix it up! Be Creative! Don‟t use these examples!




                                                                     8
Thank You!


             Summary:
             1. Easy to remember
             2. Size does matter
             3. Separation is vital


             Happy Strong Password Making 



             Michael McKinnon
             AVG (AU/NZ) Security Advisor

             mmckinnon@avg.com.au




                                              9

Más contenido relacionado

Destacado

Management report
Management reportManagement report
Management report
Rishi Jain
 
Policy vs strategic planning
Policy vs strategic planningPolicy vs strategic planning
Policy vs strategic planning
Mentari Pagi
 
Management presentation
Management presentationManagement presentation
Management presentation
Rishi Jain
 
CH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsCH 04 - Risk & Return Basics
CH 04 - Risk & Return Basics
Mentari Pagi
 
Implementing strategy
Implementing strategyImplementing strategy
Implementing strategy
Mentari Pagi
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology Management
Mentari Pagi
 
Chapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationChapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement Formulation
Mentari Pagi
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of Capital
Mentari Pagi
 
strategy formulation
strategy formulationstrategy formulation
strategy formulation
Mentari Pagi
 

Destacado (9)

Management report
Management reportManagement report
Management report
 
Policy vs strategic planning
Policy vs strategic planningPolicy vs strategic planning
Policy vs strategic planning
 
Management presentation
Management presentationManagement presentation
Management presentation
 
CH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsCH 04 - Risk & Return Basics
CH 04 - Risk & Return Basics
 
Implementing strategy
Implementing strategyImplementing strategy
Implementing strategy
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology Management
 
Chapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationChapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement Formulation
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of Capital
 
strategy formulation
strategy formulationstrategy formulation
strategy formulation
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Passwords - Back to Basics!

  • 1. Passwords – Back to Basics! Michael McKinnon, AVG (AU/NZ) Security Advisor mmckinnon@avg.com.au An Avalanche Technology Group Company
  • 2. What is a Password? What should we aim for in a password? • Should be easy to remember • Should be hard to guess 2
  • 3. World’s Top 10 Most Used Passwords • 123456 • 12345 • 123456789 • Password123 • Password • 1234567 • 12345678 • abc123 • 654321 • Qwerty 3
  • 4. Can someone guess your password? • Favourite Football Team? • Pet‟s Name? • Family Members? 4
  • 5. Rank these Password in order of Strength… 1. E56#av+Yb! 2. Password123 3. aaaaaAAAAA#####43 MOST SECURE 4. 123456 5. lucasjames 5
  • 6. Why? Anatomy of a good Password • The password: aaaaaAAAAA#####43 • It is 17 characters in length • Contains upper and lowercase letters • Contains numbers • Contains the „#‟ symbol • How many combinations? • 72 combinations, 17 combinations long is 72^17 • That‟s 37 thousand billion billion billion combinations!! 6
  • 7. The Golden Rules of Passwords • Never, never, ever give your password to someone else! • Absolute minimum of 10 characters • Use a combination of different characters • upper and lowercase (a – z, A – Z) • at least one numeral ( 0 – 9 ) • at least one symbol ( !@#$%^&*()_+= ) • Password length is always better than randomness • Must be easy to remember 7
  • 8. Password Separation – Neat Tricks! • Make new passwords for different accounts you access… • Start with your “base” password (aaaaaAAAAA#####43) • “Facebook” – you could take the letters “f” and “b” from Face Book and create a new password: • aaaaaAAAAA#####43fb • “Twitter” – you could take the letters “t” and “r” from Twitter and create another password: • aaaaaAAAAA#####43tr • Mix it up! Be Creative! Don‟t use these examples! 8
  • 9. Thank You! Summary: 1. Easy to remember 2. Size does matter 3. Separation is vital Happy Strong Password Making  Michael McKinnon AVG (AU/NZ) Security Advisor mmckinnon@avg.com.au 9