SlideShare a Scribd company logo
1 of 16
Username Usage and Password Security
Username Usage
Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
Good or Bad? ,[object Object]
 BellaIsabella
 DarkAngel666
 Karla-Love-1996
 SimplyMe
 gun4hiRe
 babyfaceLA
 Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
Password Security
Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event  The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band

More Related Content

Viewers also liked

Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...
Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...
Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...Glory House
 
Diaporama définitif Nantes mini
Diaporama définitif Nantes miniDiaporama définitif Nantes mini
Diaporama définitif Nantes miniKikiauguste
 
Una verdad historica olvidada bolivia y el mar
Una verdad historica olvidada bolivia y el marUna verdad historica olvidada bolivia y el mar
Una verdad historica olvidada bolivia y el marSergio Wall
 
Sky tower
Sky towerSky tower
Sky towertakahe2
 
50 rangsangan mudah menjadikan anak bijak
50 rangsangan mudah menjadikan anak bijak50 rangsangan mudah menjadikan anak bijak
50 rangsangan mudah menjadikan anak bijakAisyah Tajudin
 
Violencia en el noviazgo
Violencia en el noviazgoViolencia en el noviazgo
Violencia en el noviazgopaulacortez
 
สรุปแบบย้อนกลับ แก้ไขด้วย
สรุปแบบย้อนกลับ แก้ไขด้วยสรุปแบบย้อนกลับ แก้ไขด้วย
สรุปแบบย้อนกลับ แก้ไขด้วยkrunakhonch
 
4th b students 2014
4th b students 20144th b students 2014
4th b students 2014misslausola
 
School magazine treatment & planning
School magazine   treatment & planningSchool magazine   treatment & planning
School magazine treatment & planningbenweeebbbbbbbbbbbb
 

Viewers also liked (11)

Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...
Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...
Buying Office Tirupur|Merchandise Tirupur|Wholesale Suppliers Tirupur www.glo...
 
Diaporama définitif Nantes mini
Diaporama définitif Nantes miniDiaporama définitif Nantes mini
Diaporama définitif Nantes mini
 
Vive sin tabaco
Vive sin tabacoVive sin tabaco
Vive sin tabaco
 
Una verdad historica olvidada bolivia y el mar
Una verdad historica olvidada bolivia y el marUna verdad historica olvidada bolivia y el mar
Una verdad historica olvidada bolivia y el mar
 
The cat
The catThe cat
The cat
 
Sky tower
Sky towerSky tower
Sky tower
 
50 rangsangan mudah menjadikan anak bijak
50 rangsangan mudah menjadikan anak bijak50 rangsangan mudah menjadikan anak bijak
50 rangsangan mudah menjadikan anak bijak
 
Violencia en el noviazgo
Violencia en el noviazgoViolencia en el noviazgo
Violencia en el noviazgo
 
สรุปแบบย้อนกลับ แก้ไขด้วย
สรุปแบบย้อนกลับ แก้ไขด้วยสรุปแบบย้อนกลับ แก้ไขด้วย
สรุปแบบย้อนกลับ แก้ไขด้วย
 
4th b students 2014
4th b students 20144th b students 2014
4th b students 2014
 
School magazine treatment & planning
School magazine   treatment & planningSchool magazine   treatment & planning
School magazine treatment & planning
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Username and Password Security Guidelines

  • 1. Username Usage and Password Security
  • 3.
  • 4. Attracting Negative Attention InYoFace Badboy2U Lookin4Luv IMAHottie FatMama suPaFlirt
  • 5. Revealing Information Tom_Evans34 Missy-13 AndyKarateKid ViolinGurl restlinmatch
  • 6.
  • 13. Watup?I8sushi2 Soccerstar Puppygirl234 keKe1995 Bookworm 2BorNot2b Choco-holic CapitlOfens
  • 14. Project Create at least 3 different screen names that you think will meet all of these guidelines: Names that are not likely to attract negative attention Names that do not use bad language Names that don’t reveal any personal information Names that don’t reveal a real name, age, or gender
  • 16. Most Commonly Used Passwords Names of baseball, football or basketball teams Birth dates of family members The year of a special sports event The word “password” or variation The number sequence “123456” or letter/number variation such as “abc123” or “123abc” The name of a family member, pet, favorite TV show character, celebrity or band
  • 17. Why are student accounts easily hacked? The password is cracked using a password cracking program. The password is easily guessed by others who know personal things about the student. Students write their passwords down where others are able to see it. Students give their password to friends who then decide to use it or give it to others who use it. Other students see the password as the student enters it on a keyboard.
  • 19. Does your password include the name of a family member or pet? -3 Does your password include a birth date of a family member? -3 Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? -1 Does your password contain a random set of numbers? +2 Does your password contain both letters and numbers? +2 Does your password have 8 or more characters? +2 Does your password have less than 6 characters? -1 Does your password contain one or more non-number, non-letter characters such as a ! Or =? +3 Does the password contain the date of a well known event, such as the date a baseball team won the pennant? -1 Does your password contain at least 3 numbers in numerical sequence such as “123”? -2 Does your password contain any word spelled backwards? -1 Is your password written down on any piece of paper within 15 feet of your computer? -2 Does your password contain your telephone number, zip code, area code, or a portion of them? -2 Does your password include a mixture of UPPER and lower case letters? +2 Have you ever shared your current password with a friend? -3
  • 20. Password Test Scoring EXCELLENT 8 or higher SOMEWHAT GOOD 4-7 Think about adding some other characters to your password VERY POOR Less than 4 Time to make a new password
  • 21. Tips for a VERY STRONG password Always use a mix of letters and numbers Use a mix of UPPER and lower case letters Use characters that are not letters or number such as =!$# Always use a password that contains 6 letters or more Create acronyms (a word that is created by taking the first letter of a sequence of words)
  • 22. Individual Project Create a secure password Think of a line from a song and write it down. Create an acronym from the first letter of each word in the line. Change at lease one letter (not the first) to a capital letter. Add a non-number, non-letter character, or a substitute a ! For an I, $ for an s, etc. Add a two or three digit number.
  • 23. Individual Project Create a secure password Think of the name of someone you admire and write it down. Create a four-letter acronym from the first two letters of their first and last name. Change at least one letter (not the first) to a capital letter. Add a non-number, non-letter character or substitute a ! for an I, $ for an s, etc. Mix in two numbers taken from your age. Don’t put these numbers next to each other.

Editor's Notes

  1. Show picture of boys – have students volunteer to come up to board and use 5 words to describe each boy.By a show of hands – Which boy do you think is more likely to be honest?Which boy do you think is more likely to be mean?Which boy do you think is more likely to be a good friend?Which boy do you think is a better students in school?Why do you think is? Based on looks?Which brings us to an important point – others judge us by how we look, dress, talk, etc. – do you feel that is a true statement? Why or why not? So, when you meet someone online – you only know their username, so the names we choose are very important – do you agree with that statement?
  2. Kids sometimes choose screen names that attract negative attention, hurtful or makes others feel uncomfortable. Choosing the wrong screen name can encourage others to treat you poorly. Explain why you think someone online might harass those with screen names such as these?
  3. Some students choose screen names that give away too much information about themselves. What can you tell about these users?If a stranger strikes up a conversation with you and states “I take karate too” would you be likely to engage in a conversation. Students have a tendency to think that since they are on the computer, the other person “cannot see them” – this is not true! – especially if that user can connect you to an email address.
  4. Have students come up to board – pick a user name that is either good or bad and explain the reasoning why – have them give specific information about what is wrong.
  5. print copies for students and have them work in groups – review names as a class
  6. Handouts – check your password