400 likes | 538 Vues
Password management is challenging, but essential for online security. Understanding that hackers can exploit weak passwords with ease emphasizes the need for complexity. Avoid password reuse and implement unique passwords for each site by using memorable phrases or character substitutions. Enrich your security with password managers and two-factor authentication to protect your accounts. Establish a secure base password and modify it with site-specific elements or dates to enhance security. Adopt smart password practices to prevent identity theft and maintain your digital safety.
E N D
Making Good Passwords (and how to keep them safe)
This is a graphics card • It’s cheap and good at playing video games. • About every teenager has access to one. • It’s also very good at hacking your password.
“A $1000 computer can process 3.3 billion passwords per second… a professional can make thousands of dollars a day selling your information on the black market.” (PCPro.com)
It’s just a matter of time • Dictionary Attacks: • “GoBuffs!” a couple minutes • “P@$$w0rd1” a couple hours • Brute Force: • “fjR8n” in 24 seconds • “%fjR8nQNUc5GPj9” would take over ten years • *Extra credit: 15 characters or more forces windows to store passwords differently – which breaks certain attacks.
Hacking is big business • 2011 = 12.5 billion in reported losses • Some estimates put that number closer to 10 times as much. www.hotforsecurity.com
How do Hackers get your password? • Physical access to your office or computer • Social Engineering/Phishing (asking nicely) • Hacking commonly used sites • Malware Infections • Network based attacks
Under Keyboard • In a Rolodex • Top desk drawer • Under desk calendar • In the planter • Wallet/Purse/Gym Bag
Now that you know Where people hide their passwords Don’t Do It
Abbreviate • Ilike taking the bus,but Iended up 20minutes late! • Becomes: • Ilttb,bIeu20ml! • (15 characters)
Letter substitution • Create a long word or phrase: • I Like To Eat Tacos • Remove spaces: • ILikeToEatTacos • Replace letters with symbols: • IL!k3T0e@tT@c0$
Word Jumble • Take two words: • Bot & Kneecap • Scramble a few letters: • Bocat_&_Kneep • Add Complexity: 54 • Bocat_&_Kne54ep
Keyboard Patterns • Use the Shift Key to Add Complexity • Becomes: 5^YghjkmnbVCX • Use with caution, easy ones are in dictionary attacks!
Ok, so I’ve got a great password, I’ll just keep using that one right?
LinkedIn lost 6.4 million users passwords • Hackers can use those passwords to commit identity fraud including: • Hack into corporate accounts • Break into bank accounts • Spam email accounts • Gather more info for offline use (Credit Cards) • LinkedIn is now facing $5 million class action lawsuit due to the loss.
Pro Tip: Making passwords unique to each site • Have a secure base password: • 5^YghjkbVCX • Select two letters from the site or program: • usbank.com (2nd & 4th in this case) • Add those letters to your password: • 5^YghjsakbVCX
Wait a minute… This site want’s me to change it now… • Todays Date: 1/11/13 • Pick a couple characters of the date: 11 • Shift the numbers (+3 in this case): 44 • Add those numbers to your password • 5^Yghjsak becomes 5^Yghjsak44 • Write down when you last change the password
Password Generators • Many free ones, but be careful! We suggest changing the results before using them. • http://www.pctools.com/guides/password/
Questions? • Joe Kuster • IT Projects Manager • Joe.Kuster@colorado.edu
Identikey • Your “username” is the Identikey assigned to you by the University. • Keep private • Commit to memory • Do not use Username or Password for any other purpose!
HR Identikey Requirements • 15 characters or longer • Avoid repeating characters • No words that can be found in a dictionary (in any language) • Not be easily guessable (e.g., your birthday, age, anniversary…) • All four character sets: capital, lowercase, numerical and symbol (e.g., A,a,1,!)