SlideShare uma empresa Scribd logo
1 de 9
Passwords – Back to Basics!
Michael McKinnon, AVG (AU/NZ) Security Advisor
mmckinnon@avg.com.au




               An Avalanche Technology Group Company
What is a Password?




What should we aim for in a password?

• Should be easy to remember

• Should be hard to guess




                                        2
World’s Top 10 Most Used Passwords

• 123456              • 12345

• 123456789           • Password123

• Password            • 1234567

• 12345678            • abc123

• 654321              • Qwerty




                                      3
Can someone guess your password?




          • Favourite Football Team?
          • Pet‟s Name?
          • Family Members?



                                       4
Rank these Password in order of Strength…


1. E56#av+Yb!

2. Password123

3. aaaaaAAAAA#####43   MOST SECURE

4. 123456

5. lucasjames




                                            5
Why? Anatomy of a good Password

• The password: aaaaaAAAAA#####43

• It is 17 characters in length

• Contains upper and lowercase letters

• Contains numbers

• Contains the „#‟ symbol

• How many combinations?

    • 72 combinations, 17 combinations long is 72^17

    • That‟s 37 thousand billion billion billion combinations!!




                                                                  6
The Golden Rules of Passwords

• Never, never, ever give your password to someone else!

• Absolute minimum of 10 characters

• Use a combination of different characters

   • upper and lowercase (a – z, A – Z)

   • at least one numeral ( 0 – 9 )

   • at least one symbol ( !@#$%^&*()_+= )

• Password length is always better than randomness

• Must be easy to remember




                                                           7
Password Separation – Neat Tricks!

• Make new passwords for different accounts you access…

• Start with your “base” password (aaaaaAAAAA#####43)

   • “Facebook” – you could take the letters “f” and “b” from Face
     Book and create a new password:
       • aaaaaAAAAA#####43fb

   • “Twitter” – you could take the letters “t” and “r” from
     Twitter and create another password:
       • aaaaaAAAAA#####43tr

• Mix it up! Be Creative! Don‟t use these examples!




                                                                     8
Thank You!


             Summary:
             1. Easy to remember
             2. Size does matter
             3. Separation is vital


             Happy Strong Password Making 



             Michael McKinnon
             AVG (AU/NZ) Security Advisor

             mmckinnon@avg.com.au




                                              9

Mais conteúdo relacionado

Destaque

Management report
Management reportManagement report
Management reportRishi Jain
 
Policy vs strategic planning
Policy vs strategic planningPolicy vs strategic planning
Policy vs strategic planningMentari Pagi
 
Management presentation
Management presentationManagement presentation
Management presentationRishi Jain
 
CH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsCH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsMentari Pagi
 
Implementing strategy
Implementing strategyImplementing strategy
Implementing strategyMentari Pagi
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementMentari Pagi
 
Chapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationChapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationMentari Pagi
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of CapitalMentari Pagi
 
strategy formulation
strategy formulationstrategy formulation
strategy formulationMentari Pagi
 

Destaque (9)

Management report
Management reportManagement report
Management report
 
Policy vs strategic planning
Policy vs strategic planningPolicy vs strategic planning
Policy vs strategic planning
 
Management presentation
Management presentationManagement presentation
Management presentation
 
CH 04 - Risk & Return Basics
CH 04 - Risk & Return BasicsCH 04 - Risk & Return Basics
CH 04 - Risk & Return Basics
 
Implementing strategy
Implementing strategyImplementing strategy
Implementing strategy
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology Management
 
Chapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement FormulationChapter 3 - Problem Statement Formulation
Chapter 3 - Problem Statement Formulation
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of Capital
 
strategy formulation
strategy formulationstrategy formulation
strategy formulation
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Passwords - Back to Basics!

  • 1. Passwords – Back to Basics! Michael McKinnon, AVG (AU/NZ) Security Advisor mmckinnon@avg.com.au An Avalanche Technology Group Company
  • 2. What is a Password? What should we aim for in a password? • Should be easy to remember • Should be hard to guess 2
  • 3. World’s Top 10 Most Used Passwords • 123456 • 12345 • 123456789 • Password123 • Password • 1234567 • 12345678 • abc123 • 654321 • Qwerty 3
  • 4. Can someone guess your password? • Favourite Football Team? • Pet‟s Name? • Family Members? 4
  • 5. Rank these Password in order of Strength… 1. E56#av+Yb! 2. Password123 3. aaaaaAAAAA#####43 MOST SECURE 4. 123456 5. lucasjames 5
  • 6. Why? Anatomy of a good Password • The password: aaaaaAAAAA#####43 • It is 17 characters in length • Contains upper and lowercase letters • Contains numbers • Contains the „#‟ symbol • How many combinations? • 72 combinations, 17 combinations long is 72^17 • That‟s 37 thousand billion billion billion combinations!! 6
  • 7. The Golden Rules of Passwords • Never, never, ever give your password to someone else! • Absolute minimum of 10 characters • Use a combination of different characters • upper and lowercase (a – z, A – Z) • at least one numeral ( 0 – 9 ) • at least one symbol ( !@#$%^&*()_+= ) • Password length is always better than randomness • Must be easy to remember 7
  • 8. Password Separation – Neat Tricks! • Make new passwords for different accounts you access… • Start with your “base” password (aaaaaAAAAA#####43) • “Facebook” – you could take the letters “f” and “b” from Face Book and create a new password: • aaaaaAAAAA#####43fb • “Twitter” – you could take the letters “t” and “r” from Twitter and create another password: • aaaaaAAAAA#####43tr • Mix it up! Be Creative! Don‟t use these examples! 8
  • 9. Thank You! Summary: 1. Easy to remember 2. Size does matter 3. Separation is vital Happy Strong Password Making  Michael McKinnon AVG (AU/NZ) Security Advisor mmckinnon@avg.com.au 9