SlideShare una empresa de Scribd logo
1 de 11
What’s your Password ???
Top passwords of all times… 123456, password, 12345678, lifehack, qwerty, abc123, 111111, monkey, consumer, 12345, 696969, letmein, trustno1,god,love.  It has been reported that almost 188,279 passwords were leaked, out of which it was discovered that more than 3,000 users chose "123456" as their login password, making the password top the list of most common passwords. Moreover, nearly 2,000 people chose "password" as their protective word and over 1,000 people decided that "12345678" is an appropriate security choice for them.
Other smart guesses would be… Your parents/partners, child, or pet's name, possibly followed by a 0,1. Digits from your phone number, vehicle etc. Your city, or college, favourite  team name. Date of birth – yours, your partner's or your child's.
Breaches in your Personal Security Using same password for most stuff. Bank websites are mostly quite secure, but most forums, online greeting cards etc. aren't prepared for an attack. So, all we have to do now is unleash Brutus, or any other password cracker on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible. Once we've got several login + password pairings we can then go back and test them on targeted sites. But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache.
Other places a hacker can trace your activity  Temporary Internet files, Web site cookies, browser history, and index.dat Typed URL history Saved passwords and form auto-complete information stored in your browser Recent Documents Usage history of: Start/Run, Search Temporary directories on the hard drive Items contained within the Windows Registry Deleted items contents Media player history Using CCleaner or Privacy Eraser.
Must be at least 8 characters long. Never use same passwords for all accounts, rather have a general rule set of generating “unique” passwords. For example, have a base password and then use 1st two consonants and then 1st two vowels of your service provider. Say, base password = uiop For yahoo it’d be uiopyhao You can add numbers and special characters too for enhancing password, like uiOp#01yhao . Guide to choosing Secure Passwords.
Initials of your favorite song or movie, say Pirates of the Caribbean = PotC. Use a pre-established keyboard pattern, like "yui" or "zxcv." Just look at your keyboard to remember it. For extra security, choose an easy to remember base, like "cat" and then shift your fingers up one row on the keyboard when you type it. In the case of "cat," you'd get "dq5." Selecting a base Password
What if One-rule set is compromised ? One can use basic cryptography, as in replace ‘I’ by 1 or !, ‘a’ by @,’o’ by 0,’s’ by $ or &,’e’ by 3 and lots more… Randomly throw in capital letters. Using password managers, they generate errand string from your simple passwords, like “GMLT10AMA” is “1341b4ea8919” and need a master password. Also these passwords are almost irreversible ! But it comes back to squaring one, it all depends how strong is your master password. Always check strength of your passwords, here’s a website : www.passwordmeter.com

Más contenido relacionado

Similar a Passwords

Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
Marian Merritt
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
University of Hertfordshire
 

Similar a Passwords (20)

Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016 ‘123456’ worst password of the year 2016
‘123456’ worst password of the year 2016
 
Identity
IdentityIdentity
Identity
 
Password Management
Password ManagementPassword Management
Password Management
 
Password management
Password managementPassword management
Password management
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
Greater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityGreater Wheeling AITP Web Security
Greater Wheeling AITP Web Security
 
Securing password
Securing passwordSecuring password
Securing password
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
 
Secure passwords
Secure passwordsSecure passwords
Secure passwords
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Passwords

  • 2.
  • 3. Top passwords of all times… 123456, password, 12345678, lifehack, qwerty, abc123, 111111, monkey, consumer, 12345, 696969, letmein, trustno1,god,love. It has been reported that almost 188,279 passwords were leaked, out of which it was discovered that more than 3,000 users chose "123456" as their login password, making the password top the list of most common passwords. Moreover, nearly 2,000 people chose "password" as their protective word and over 1,000 people decided that "12345678" is an appropriate security choice for them.
  • 4. Other smart guesses would be… Your parents/partners, child, or pet's name, possibly followed by a 0,1. Digits from your phone number, vehicle etc. Your city, or college, favourite team name. Date of birth – yours, your partner's or your child's.
  • 5. Breaches in your Personal Security Using same password for most stuff. Bank websites are mostly quite secure, but most forums, online greeting cards etc. aren't prepared for an attack. So, all we have to do now is unleash Brutus, or any other password cracker on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible. Once we've got several login + password pairings we can then go back and test them on targeted sites. But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache.
  • 6.
  • 7.
  • 8. Other places a hacker can trace your activity Temporary Internet files, Web site cookies, browser history, and index.dat Typed URL history Saved passwords and form auto-complete information stored in your browser Recent Documents Usage history of: Start/Run, Search Temporary directories on the hard drive Items contained within the Windows Registry Deleted items contents Media player history Using CCleaner or Privacy Eraser.
  • 9. Must be at least 8 characters long. Never use same passwords for all accounts, rather have a general rule set of generating “unique” passwords. For example, have a base password and then use 1st two consonants and then 1st two vowels of your service provider. Say, base password = uiop For yahoo it’d be uiopyhao You can add numbers and special characters too for enhancing password, like uiOp#01yhao . Guide to choosing Secure Passwords.
  • 10. Initials of your favorite song or movie, say Pirates of the Caribbean = PotC. Use a pre-established keyboard pattern, like "yui" or "zxcv." Just look at your keyboard to remember it. For extra security, choose an easy to remember base, like "cat" and then shift your fingers up one row on the keyboard when you type it. In the case of "cat," you'd get "dq5." Selecting a base Password
  • 11. What if One-rule set is compromised ? One can use basic cryptography, as in replace ‘I’ by 1 or !, ‘a’ by @,’o’ by 0,’s’ by $ or &,’e’ by 3 and lots more… Randomly throw in capital letters. Using password managers, they generate errand string from your simple passwords, like “GMLT10AMA” is “1341b4ea8919” and need a master password. Also these passwords are almost irreversible ! But it comes back to squaring one, it all depends how strong is your master password. Always check strength of your passwords, here’s a website : www.passwordmeter.com