Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Passcode Security
Big thanks to my parents for the tools and thanks to Javon & Kofi for the encouragement and support :) .
Trial and Error [ Padlock ]
Combination lock facts
We are often not aware of our actions or lack there of when it comes to password security. When using a shared computer, it is important to clear your form data and cookies when you are no longer using the computer. In addition, your system may be hacked if you are not following the recommended password security measures of using complex phrases for passwords.
We may use physical measures such as locks to secure our electronic devices. Typically, this is the only line of defense between your devices and the thief. To prevent the padlock from being hacked, it is important to obtain a lock that either has a key or a digital lock that would require more than a passcode.
Although the data breaches at Sony, Target and Home Depot, did not involve just password security, taking care of password security at the lowest levels of the companies could have helped to prevent the cyber attacks that almost crippled the companies.
How Easily Can Your Password Be Hacked
Materials & procedures
Black ink pen; Number 2 Pencil
1 subject composition log book
Master Lock combination lock
32 35 18.5 26
22 & 23 22.5
25 & 22 25.5
We use password security daily to secure our personal information. We use them on things such as computers, cell phones, alarm systems, etc... In order to safeguard our information from hackers, we must implement password security measures to accomplish this.
Using a variety of hacking methods, I attempted to gain access to my dad's gmail account. I also attempted to gain entry to my brother's iPhone. Finally, I attempted to decode a padlock.
In my experiment, I was successful in gaining entry into my little brother's cell phone and my dad's gmail account as they did not exercise proper security awareness. However, I was unsuccessful in decoding the padlock as my hacking methods were not accurate.
Because the dials on the lock are 0-39, there is a great amount of possible combinations, strong or weak. On a pad lock, there are 1,000 possible outcomes since 1o is cubed (10^3) because there are 3 slots with 10 dials. On Master Lock combination lock there are 64,000 total combinations that can be tried.
Providers of computer services such as banking, email, or social media have the responsibility of keeping hackers out of their systems. For years, hackers have been very successful in stealing valuable information from consumers. The purpose of this experiment is to determine how anyone/anything can be hacked without proper password protection. As a computer user, you can do your part by not sharing your personal information and making sure you pick strong passwords to secure your information. Due to recent data breaches of major companies, I felt it was important to understand the importance of password security and cyber awareness.
35, 18, 39, 12, 32, 2
Science Buddies Staff. "Password Security: How Easily Can Your Password Be Hacked?" Science Buddies. Science Buddies, 1 Dec. 2014. Web 24 Feb. 2015 < http://.sciencebuddies.org/science-fair-projects/project_ideas/CompSci_p046.shtml
Kid hacks into Fox News.
Glossary of Terms.
state of being protected against the unauthorized use of electronic data.
consists of at least 6 characters that are a combination mix of characters and symbols with upper and lowercase letters.
a sequence of words longer than the usual password.
message digest, a number generated from a finning of text.
a graphical representation of a computer program in realtion to its sequence to its sequence of functions.
a made up password with no specific meaning to it.
a memory technique to help your brain encode and recall important information.
a simple 6 character password.
any 0 digit that comes before the first non zero digit a number string in positional notation.
The graph of power to test for various alternatives.
• Imperva Application Defense Center. (2010) Consumer Password Worst Practices
• Burnett, M. (2012, September 5). 6 New password Rules. Xato.
• Lucas, I. (2009, July 10). Password Recovery Speeds. Lockdown. co. uk - The Home Computer Security Centre.
• Shaffer, G. (2012). Good and Bad Passwords How- To. Geodsoft.
*Hacking into other's password-protected accounts is a federally proescutable offense. This project example in the science project will only work in the context of this science project
Anonymous Hacks Into CNN While Live.
HYPOTHESIS: If one uses a technique to hack an object, he or she will get into it no matter if it is weak or strong.
My hypothesis was proven to be correct for the most part. The technique I used for the gmail account was simple and easy to follow. It demonstrated that the lack of password security awareness makes it easy to hack. For physical security, I was to pull on the shackle of the lock a little hard and see where the lock stops and record my numbers. It is actually pretty difficult. I did about 30 trials and 15 extra trials in my log book. I wasn't able to crack the lock, but if I were do a little more trials I would've cracked it.
The point of the project was to show that anyone's personal password can be hacked. Sometimes it doesn't even have to be a password. Example: the kid that hacked into Fox News for absolutely no reason. That just proves that anything can be hacked with just a little time! I wasn't able to get into the lock because my math was incorrect. Either way hacking isn't very smart and is just a past time for some people. Please do not try at home.
*hacking is a federal offense*
PLEASE do not try at home!
East Coweta High School
The importance of using strong passwords
The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.
Although many alternatives for user authentication are available today, most users log on to their computer and on to remote computers using a combination of their user name and a password typed at their keyboard.
Some retailers will configure their Point of Service terminals to auto login on boot. Some retailers will allow the user to select their own password. To make it easier to remember their passwords, users often use the same or similar passwords on each system; and given a choice, most users will select a very simple and easy-to-remember password such as their birthday, their mother's maiden name, or the name of a relative. Short and simple passwords are relatively easy for attackers to determine.
Different ways of hacking
—The attacker attempts to log on using the user's account by repeatedly guessing likely words and phrases such as their children's names, their city of birth, and local sports
Online Dictionary Attack
—The attacker uses an automated program that includes a text file of words. The program repeatedly attempts to log on to the target system using a different word from the text file on each try.
Offline Dictionary Attack
—Similar to the online dictionary attack, the attacker gets a copy of the file where the hashed or encrypted copy of user accounts and passwords are stored and uses an automated program to determine what the password is for each account. This type of attack can be completed very quickly once the attacker has managed to get a copy of the password file.
Offline Brute Force Attack
—This is a variation of the dictionary attacks, but it is designed to determine passwords that may not be included in the text file used in those attacks.
Different types of hackers
Let's do this for fun
There is no particular reason for this type of hacking whatsoever except for having fun. these hackers just hack as another past time or as a challenge to prove that they can do it which is very pointless and not the smartest thing to do.
These specific type of hackers hack for things such as credit cards, password information, cracking codes, and etc... They hack for self gain, to steal, and to reward themselves with something not earned and is not their own.
I have an opinion hackers
These are the most probably reasonable hackers possible. They breach systems to stretch political or ideological points and or opinions or to get information to use for these purposes only. Instead of using hacking as something unbelievably idiotic, they use hacking (still illegal) as a target for topics such as government or business campaigns.
Dad's gmail account
1.) I logged into my computer and used the guessing method.
I tried kid's name, graduation date, tattoo, favorite events, favorite food, etc...
2.) Then I logged into a shared computer which had auto login
Opened google browser
Entered gmail account name
Password auto populated and obtained access