Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Passwords

Password lecture
by

Marianne Daugharthy

on 6 June 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Passwords

How many Guesses
would it take?
Attacks and Solutions
Passwords
Passwords
Notes
Place your own picture
behind this frame!
Double click to crop it if necessary
San Francisco
Budapest
Important
Details
(cc) photo by Metro Centric on Flickr
(cc) photo by Franco Folini on Flickr
(cc) photo by jimmyharris on Flickr
Stockholm
(cc) photo by Metro Centric on Flickr
If you invited me to try and crack your
password, you kow the one that you
use over and over for every web page you visit.
How many guesses, or how long, would
it take before I got it?
Top 10 I Will Use To Guess
Top 10 Internet Passwords
Results
Brute Force Attack
Time to Break Password
What to Do
Assets
map
details
doodles
notes
outlook
photo frame
123456
1234567
12345
123
abc123
12345678
123456789
password
letmein
qwerty
123 to 123456
partner, child, or pet's name
last 4 digits of SSN
password
city, college, football team
letmein
your, partner, or child's date of birth
love
god
money
Statistically speaking this should cover
about 20% of you.
Score with CISA stdents in the last 3
semesters at CWI:
34-40%
When a hacker uses a specially
written piece of software to
attempt to log into a site using
your credentials.
supercalifragilisticexpialidosious
From this -
supercalifragilisticexpialidosious
To this-
Supercal1fraG1l1st1cexp1al1dos1ous
We all use passwords to protect our personal information. How we create our passwords and what we use for our passwords is the basis for this presentation.
The following is a list of the top ten most commonly used passwords. Do you use any of these passwords? If you do you might rethink your password selection.
Hackers are skilled at breaking into accounts. The following are some of the questions that hackers will use in the pursuit of your important private information
Do you fit the profile?
Using Brute force attack
methods you can see the time it takes to break a password in the following table
Full transcript