SlideShare una empresa de Scribd logo
1 de 13
Password Management and 2
    Factor Authentication
 Because post-its on your desk aren’t
               enough
Passwords vs Passphrase
Go to a website to check it out
• http://rumkin.com/tools/password/passchk.p
  hp
More than just entropy
• Entropy
   – 25-GPU cluster cracks every standard Windows password in
     <6 hours
           • http://arstechnica.com/security/2012/12/25-gpu-
              cluster-cracks-every-standard-windows-password-in-
              6-hours/


• Not Entropy (Rainbow Tables)
   – The multi-platform password cracker Ophcrack is incredibly
     fast. How fast? It can crack the password "Fgpyyih804423" in
     160 seconds.
   – http://www.codinghorror.com/blog/2007/09/rainbow-hash-
     cracking.html
But, you need a separate one for every
              website so …
• You could try an algorithm
  – Here is one example:
       The first digit is the number of characters on the name of the
       website.
       The second digit is “c” is the number in the first step was odd, and
       “t” if it was even.
       The third digit is the last letter of the name of the website.
       The fourth digit is “$” if the letter in the previous step was a
       vowel, and “%” if it was a consonant.
       The last three digits are the first three letters of the name of the
       website.
       Using the algorithm above, your password on Twitter would be
       “7cr%twi” and on Facebook it would be “8tk%fac”.
             http://www.dailyblogtips.com/develop-an-algorithm-for-your-
             online-passwords-and-never-forget-one-again/
Sane Answer: Password Managers
• Keepass http://keepass.info/
• LastPass https://lastpass.com/

• Either better than letting your browser
  remember it.
  – Encrypted
  – Usable across platforms
When They Fail
• Password Managers are not perfect
• Learn to use them
• Have a backup plan
2 Factor Authentication

– Two-factor authentication is often confused with
  other forms of authentication. Two-factor
  authentication requires the use of two of the three
  authentication factors. The factors are identified in
  the standards and regulations for access to U.S.
  Federal Government systems. These factors are:
   • Something the user knows (e.g., password, PIN, pattern);
   • Something the user has (e.g., ATM card, smart card); and
   • Something the user is (e.g., biometric characteristic, such as
     a fingerprint).
Examples
• You use it already
  – Conference Room


• Online version
  – Google best example
  – https://support.google.com/accounts/bin/answer.
    py?hl=en&answer=180744
Why use it
• Gives you better protection against online
  identity theft.
• It’s easy.
• May someday be required.
The Future
• Physical Tokens
  – How it works
  – With a simple touch of the gold disc, the YubiKey
    sends a One Time Password (OTP) as if it was
    typed in from a keyboard. The unique passcode is
    verified by a YubiKey compliant application.
It’s small
Resources
– http://lifehacker.com/184773/geek-to-live--
  choose-and-remember-great-passwords
– http://lifehacker.com/5505400/how-id-hack-your-
  weak-passwords
– http://lifehacker.com/5944969/which-password-
  manager-is-the-most-secure
– http://en.wikipedia.org/wiki/Two-
  factor_authentication

Más contenido relacionado

Destacado

Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Komal Patil
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi TechnologyAman Raj
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank AlgorithmOmkar Dash
 
Seo (Search Engine Optimization)
Seo (Search Engine Optimization)Seo (Search Engine Optimization)
Seo (Search Engine Optimization)mudit agrawal
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentationguest561f62
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introductiontoryharis
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer scienceRinshad Akbar K K
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessArnab Roy Chowdhury
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt TeachersTedine Soule
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Dennis Deacon
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 

Destacado (19)

Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank Algorithm
 
Seo (Search Engine Optimization)
Seo (Search Engine Optimization)Seo (Search Engine Optimization)
Seo (Search Engine Optimization)
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
Wi vi ppt
Wi vi pptWi vi ppt
Wi vi ppt
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer science
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
 
Yubikey Neo
Yubikey NeoYubikey Neo
Yubikey Neo
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of Business
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt Teachers
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Más de Edward Iglesias

Más de Edward Iglesias (16)

Implementing Virtual Reality in an Academic Library
Implementing Virtual Reality in an Academic Library Implementing Virtual Reality in an Academic Library
Implementing Virtual Reality in an Academic Library
 
CLASS Conference 2014
CLASS Conference 2014CLASS Conference 2014
CLASS Conference 2014
 
It came from the Printer
It came from the PrinterIt came from the Printer
It came from the Printer
 
CLC Maker Workshop 2014
CLC Maker Workshop 2014CLC Maker Workshop 2014
CLC Maker Workshop 2014
 
Digital History Class Presentation
Digital History Class PresentationDigital History Class Presentation
Digital History Class Presentation
 
Technologies of Makerspaces
Technologies of MakerspacesTechnologies of Makerspaces
Technologies of Makerspaces
 
CLA Makerspace
CLA  MakerspaceCLA  Makerspace
CLA Makerspace
 
Ccald2
Ccald2Ccald2
Ccald2
 
Cloud presentation NELA
Cloud presentation NELACloud presentation NELA
Cloud presentation NELA
 
Asist mit 2012
Asist mit 2012Asist mit 2012
Asist mit 2012
 
Cloudcomputingday2
Cloudcomputingday2Cloudcomputingday2
Cloudcomputingday2
 
Cloud Computing Day 1
Cloud Computing Day 1Cloud Computing Day 1
Cloud Computing Day 1
 
Digital History Presentation
Digital History PresentationDigital History Presentation
Digital History Presentation
 
Presentation for RILA
Presentation for RILAPresentation for RILA
Presentation for RILA
 
Burrito digital archive system
Burrito digital archive systemBurrito digital archive system
Burrito digital archive system
 
Discovery Layers
Discovery LayersDiscovery Layers
Discovery Layers
 

Último

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Último (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Password Managers and 2 Factor Authentication

  • 1. Password Management and 2 Factor Authentication Because post-its on your desk aren’t enough
  • 3. Go to a website to check it out • http://rumkin.com/tools/password/passchk.p hp
  • 4. More than just entropy • Entropy – 25-GPU cluster cracks every standard Windows password in <6 hours • http://arstechnica.com/security/2012/12/25-gpu- cluster-cracks-every-standard-windows-password-in- 6-hours/ • Not Entropy (Rainbow Tables) – The multi-platform password cracker Ophcrack is incredibly fast. How fast? It can crack the password "Fgpyyih804423" in 160 seconds. – http://www.codinghorror.com/blog/2007/09/rainbow-hash- cracking.html
  • 5. But, you need a separate one for every website so … • You could try an algorithm – Here is one example: The first digit is the number of characters on the name of the website. The second digit is “c” is the number in the first step was odd, and “t” if it was even. The third digit is the last letter of the name of the website. The fourth digit is “$” if the letter in the previous step was a vowel, and “%” if it was a consonant. The last three digits are the first three letters of the name of the website. Using the algorithm above, your password on Twitter would be “7cr%twi” and on Facebook it would be “8tk%fac”. http://www.dailyblogtips.com/develop-an-algorithm-for-your- online-passwords-and-never-forget-one-again/
  • 6. Sane Answer: Password Managers • Keepass http://keepass.info/ • LastPass https://lastpass.com/ • Either better than letting your browser remember it. – Encrypted – Usable across platforms
  • 7. When They Fail • Password Managers are not perfect • Learn to use them • Have a backup plan
  • 8. 2 Factor Authentication – Two-factor authentication is often confused with other forms of authentication. Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. These factors are: • Something the user knows (e.g., password, PIN, pattern); • Something the user has (e.g., ATM card, smart card); and • Something the user is (e.g., biometric characteristic, such as a fingerprint).
  • 9. Examples • You use it already – Conference Room • Online version – Google best example – https://support.google.com/accounts/bin/answer. py?hl=en&answer=180744
  • 10. Why use it • Gives you better protection against online identity theft. • It’s easy. • May someday be required.
  • 11. The Future • Physical Tokens – How it works – With a simple touch of the gold disc, the YubiKey sends a One Time Password (OTP) as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey compliant application.
  • 13. Resources – http://lifehacker.com/184773/geek-to-live-- choose-and-remember-great-passwords – http://lifehacker.com/5505400/how-id-hack-your- weak-passwords – http://lifehacker.com/5944969/which-password- manager-is-the-most-secure – http://en.wikipedia.org/wiki/Two- factor_authentication