slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
PowerPoint Presentation - Information Security Management PowerPoint Presentation
Download Presentation
PowerPoint Presentation - Information Security Management

play fullscreen
1 / 40

PowerPoint Presentation - Information Security Management

382 Views Download Presentation
Download Presentation

PowerPoint Presentation - Information Security Management

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

    13. Passwords Simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network Virtually ineffective if people do not protect their passwords. The golden rules, or policies for passwords are: Make passwords as meaningless as possible Change passwords regularly Never divulge passwords to anyone UA Password Standard http://security.arizona.edu/drafts.html

    14. Now let's talk about making a better, stronger password. (click) (discuss any of these if necessary) - Don't use names (click) - Don't use personal information (click) - Don't use words found in a dictionary (click) - Use at least eight characters The longer the password is, the harder it is for a person or program to guess. (click) - Use both letters and numbers This greatly increases the possible combinations of characters. (click) - Use special characters if possible A valuable added strength if your system allows them. (click) - Use upper and lower case letters This doubles the possible combination and makes a password exponentially stronger. (click) - combine misspelled words This helps protect against a dictionary type program attack. (go to next screen)Now let's talk about making a better, stronger password. (click) (discuss any of these if necessary) - Don't use names (click) - Don't use personal information (click) - Don't use words found in a dictionary (click) - Use at least eight characters The longer the password is, the harder it is for a person or program to guess. (click) - Use both letters and numbers This greatly increases the possible combinations of characters. (click) - Use special characters if possible A valuable added strength if your system allows them. (click) - Use upper and lower case letters This doubles the possible combination and makes a password exponentially stronger. (click) - combine misspelled words This helps protect against a dictionary type program attack. (go to next screen)

    19. It's probably safer to store a strong password in a place where someone would have to physically break in than to expose a weak password to 300,000,000 people on the internet.

    20. Safeguard Your Strong Password Be careful about typing your password into a strange computer. Is the owner trustworthy or are they perhaps running a keyboard logger recording your keystrokes? (It has happened). Who was the last person to use it and what did they run on it?

    21. Be careful about typing your password into a strange program, web site, or server. Why do they need it? Are they authorized to ask for it? A web site on the other side of the country should definitely not be asking for your U of A password over the network whenever possible. Do not use the same password on an unofficial, entertainment, off-campus, OR uncritical service that you use for more critical services.