Computer Security Password Management Computer Security Password Management
- Slides: 12
Computer Security Password Management
Computer Security Password Management EXISTING ACCOUNTS: Checking “Remember me”, “Stay signed in” and not having a record can destroy you.
Computer Security Password Management Setting up new accounts: USER IDs ARE NOT PASSWORDS - Simple is better than cute SECURITY COMES FROM PASSWORDS • Use a different password on each account • 8 characters or more • Mix lower, upper case letters, numbers, permitted special characters (*, &, %, #, !, $, &, etc. , some sites will not accept some of these) • Avoid names, dates, house numbers or email addresses, etc. • Change password occasionally or if you suspect it has been compromised • Mnemonics are helpful – Example: 1 Small, 2 Medium, 3 Large
Computer Security Password Management Recovering lost passwords: OPTIONS – Set when you create account Alternate email address, code sent as email – email must be accessible SMS text message, code sent to cell phone – must have phone, reception Security questions – answers that you can remember Simple, unambiguous, explicit, unique – preferably one word
Computer Security Password Management Keeping records of passwords: MUST BE: Available, Current, Redundant Handwritten lists Tabular format files – password protected spreadsheet or Word tables Password management software – Example: Last. Pass
Computer Security Password Management Free: https: //lastpass. com/misc_download 2. php Last. Pass for Firefox Last. Pass for Chrome (full version) Last. Pass for Chrome Last. Pass for Opera Last. Pass IE Anywhere
Computer Security Password Management Create account and log in
Computer Security Password Management Stored in the cloud
Computer Security Password Management
Computer Security Password Management
Computer Security Password Management https: //www. consumer. ftc. gov/features/feature-0038 -onguardonline
- Private securit
- Adp forgot password
- Microsoft identity management self service password reset
- The osi security architecture
- Security guide to network security fundamentals
- Wireless security in cryptography
- Visa international security model
- Electronic mail security in network security
- What is nstissc security model
- E commerce security meaning
- Building security software
- Security guide to network security fundamentals
- Security guide to network security fundamentals