Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Password Security_Example v0.2

No description
by

Faham Usman

on 18 January 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Password Security_Example v0.2

Information Security
Password Security
Awareness Campaign
Agenda
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.
About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
Password
Password Cracking
Password Best Practices
Strong Passwords
Common Passwords
aeCERT
Salim (aeCERT)
@salim_aecert
For more information
www.aecert.ae
info@aecert.ae
Questions
The attacker intercepts the encrypted packet and compares it with the original one allowing him to get encryption key

The Key to your Information
Creating Strong Passwords
Examples of Strong Passwords
Password
A Password is a secret set of characters.

Password is used to authenticate different applications, files, programs, operating systems, online resources and devices.

The purpose of using passwords is to disallow unauthorized access and protect information.

Password Best Practices
Password Best Practices
Source: https://identitysafe.norton.com/password-generator
Generating Strong Password
Strong Passwords
Adobe: Most Common Email Domains
Adobe: Leaked Password Strength
The Key to Your Information
Your passwords are the keys to your information.

Cyber criminals are targeting your passwords to gain access to your online accounts.

Passwords are “Your first line of defense.”

Password Policy
http://www.pcmag.com/article2/0,2817,2393156,00.asp
Tools
http://keepass.info/

Tools
Source: http://www.huffingtonpost.com/2012/07/12/yahoo-hacked_n_1668446.html
Yahoo: Leaked Password Strength
http://www.splashdata.com/splashid/desktop/
http://lifehacker.com/5041463/lastpass-saves-and-syncs-passwords-between-all-your-browsers
Tools
Source: http://www.huffingtonpost.com/2012/07/12/yahoo-hacked_n_1668446.html
Yahoo: Leaked Passwords Combination
Password Cracking
LinkedIn: Leaked Passwords Combination
Password Cracking (Time)
Source: http://www.huffingtonpost.com/2012/07/12/yahoo-hacked_n_1668446.html
Top 10 most common Yahoo leaked passwords (2012):
Yahoo: Leaked Common Passwords
LinkedIn: Most Common Leaked Passwords
Top 10 most common passwords:
Adobe: Most Common Leaked Passwords
Examples of Weak Passwords
30% of passwords with more than 8 characters
2 people have a password with 40 characters
Number of characters
LinkedIn: Leaked Passwords Strength
Memorable
Tools
Password Best Practices
Full transcript