SlideShare una empresa de Scribd logo
1 de 11
Login Passwords
Password Do’s and Don’ts
 Create unique passwords that that use a
combination of words, numbers, symbols,
and both upper- and lower-case letters.
 Do not use your network username as your password.
 Don’t use easily guessed passwords, such as “password” or
“user.”
 Do not choose passwords
based upon details that may
not be as confidential as you’d
expect, such as your birth
date, your Social Security or
phone number, or names of
family members.
 Do not use words that can be found in the dictionary.
 Avoid using simple adjacent keyboard combinations: For
example, “qwerty” and “asdzxc” and “123456” are horrible
passwords and that are trivial to crack.
 Some of the easiest-to-remember passwords aren’t words at all
but collections of words that form a phrase or sentence,
perhaps the opening sentence to your favorite novel, or the
opening line to a good joke.
 Complexity is nice, but length is key.
 Avoid using the same password at multiple Web sites.
 Never use the password you’ve picked for your email account
at any online site.
 Whatever you do, don’t store your list of passwords on your
computer in plain text!!!

Más contenido relacionado

Similar a 8 login passwords

S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwordsahyaimie
 
How to-create-strong-computer-password
How to-create-strong-computer-passwordHow to-create-strong-computer-password
How to-create-strong-computer-passwordAkshay Khale
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A BlogToby1
 
How to Create a Strong Password.pdf
How to Create a Strong Password.pdfHow to Create a Strong Password.pdf
How to Create a Strong Password.pdfinfosec train
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdfData Hops
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 

Similar a 8 login passwords (20)

Passwords are just like your underwear
Passwords are just like your underwearPasswords are just like your underwear
Passwords are just like your underwear
 
Staying Safe Online
Staying Safe OnlineStaying Safe Online
Staying Safe Online
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
Document
DocumentDocument
Document
 
Passwords
PasswordsPasswords
Passwords
 
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
How to-create-strong-computer-password
How to-create-strong-computer-passwordHow to-create-strong-computer-password
How to-create-strong-computer-password
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Password Protection
Password ProtectionPassword Protection
Password Protection
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
 
How to Create a Strong Password.pdf
How to Create a Strong Password.pdfHow to Create a Strong Password.pdf
How to Create a Strong Password.pdf
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdf
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Identity
IdentityIdentity
Identity
 
Securing password
Securing passwordSecuring password
Securing password
 

Más de mohamad Hamizi

7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer mohamad Hamizi
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email mohamad Hamizi
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices mohamad Hamizi
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security mohamad Hamizi
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 

Más de mohamad Hamizi (7)

7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

8 login passwords

  • 2. Password Do’s and Don’ts  Create unique passwords that that use a combination of words, numbers, symbols, and both upper- and lower-case letters.
  • 3.  Do not use your network username as your password.
  • 4.  Don’t use easily guessed passwords, such as “password” or “user.”
  • 5.  Do not choose passwords based upon details that may not be as confidential as you’d expect, such as your birth date, your Social Security or phone number, or names of family members.
  • 6.  Do not use words that can be found in the dictionary.
  • 7.  Avoid using simple adjacent keyboard combinations: For example, “qwerty” and “asdzxc” and “123456” are horrible passwords and that are trivial to crack.
  • 8.  Some of the easiest-to-remember passwords aren’t words at all but collections of words that form a phrase or sentence, perhaps the opening sentence to your favorite novel, or the opening line to a good joke.  Complexity is nice, but length is key.
  • 9.  Avoid using the same password at multiple Web sites.
  • 10.  Never use the password you’ve picked for your email account at any online site.
  • 11.  Whatever you do, don’t store your list of passwords on your computer in plain text!!!

Notas del editor

  1. Password-cracking tools freely available online often come with dictionary lists that will try thousands of common names and passwords. If you must use dictionary words, try adding a numeral to them, as well as punctuation at the beginning or end of the word (or both!).
  2. It used to be the case that picking an alphanumeric password that was 8-10 characters in length was a pretty good practice.
  3. It’s generally safe to re-use the same password at sites that do not store sensitive information about you (like a news Web site) provided you don’t use this same password at sites that are sensitive.
  4. If you do, and an e-commerce site you are registered at gets hacked, there’s a good chance someone will be reading your e-mail soon
  5. My views on the advisability of keeping a written list of your passwords have evolved over time.