SlideShare uma empresa Scribd logo
1 de 13
Password Management and 2
    Factor Authentication
 Because post-its on your desk aren’t
               enough
Passwords vs Passphrase
Go to a website to check it out
• http://rumkin.com/tools/password/passchk.p
  hp
More than just entropy
• Entropy
   – 25-GPU cluster cracks every standard Windows password in
     <6 hours
           • http://arstechnica.com/security/2012/12/25-gpu-
              cluster-cracks-every-standard-windows-password-in-
              6-hours/


• Not Entropy (Rainbow Tables)
   – The multi-platform password cracker Ophcrack is incredibly
     fast. How fast? It can crack the password "Fgpyyih804423" in
     160 seconds.
   – http://www.codinghorror.com/blog/2007/09/rainbow-hash-
     cracking.html
But, you need a separate one for every
              website so …
• You could try an algorithm
  – Here is one example:
       The first digit is the number of characters on the name of the
       website.
       The second digit is “c” is the number in the first step was odd, and
       “t” if it was even.
       The third digit is the last letter of the name of the website.
       The fourth digit is “$” if the letter in the previous step was a
       vowel, and “%” if it was a consonant.
       The last three digits are the first three letters of the name of the
       website.
       Using the algorithm above, your password on Twitter would be
       “7cr%twi” and on Facebook it would be “8tk%fac”.
             http://www.dailyblogtips.com/develop-an-algorithm-for-your-
             online-passwords-and-never-forget-one-again/
Sane Answer: Password Managers
• Keepass http://keepass.info/
• LastPass https://lastpass.com/

• Either better than letting your browser
  remember it.
  – Encrypted
  – Usable across platforms
When They Fail
• Password Managers are not perfect
• Learn to use them
• Have a backup plan
2 Factor Authentication

– Two-factor authentication is often confused with
  other forms of authentication. Two-factor
  authentication requires the use of two of the three
  authentication factors. The factors are identified in
  the standards and regulations for access to U.S.
  Federal Government systems. These factors are:
   • Something the user knows (e.g., password, PIN, pattern);
   • Something the user has (e.g., ATM card, smart card); and
   • Something the user is (e.g., biometric characteristic, such as
     a fingerprint).
Examples
• You use it already
  – Conference Room


• Online version
  – Google best example
  – https://support.google.com/accounts/bin/answer.
    py?hl=en&answer=180744
Why use it
• Gives you better protection against online
  identity theft.
• It’s easy.
• May someday be required.
The Future
• Physical Tokens
  – How it works
  – With a simple touch of the gold disc, the YubiKey
    sends a One Time Password (OTP) as if it was
    typed in from a keyboard. The unique passcode is
    verified by a YubiKey compliant application.
It’s small
Resources
– http://lifehacker.com/184773/geek-to-live--
  choose-and-remember-great-passwords
– http://lifehacker.com/5505400/how-id-hack-your-
  weak-passwords
– http://lifehacker.com/5944969/which-password-
  manager-is-the-most-secure
– http://en.wikipedia.org/wiki/Two-
  factor_authentication

Mais conteúdo relacionado

Destaque

Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Komal Patil
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi TechnologyAman Raj
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank AlgorithmOmkar Dash
 
Seo (Search Engine Optimization)
Seo (Search Engine Optimization)Seo (Search Engine Optimization)
Seo (Search Engine Optimization)mudit agrawal
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentationguest561f62
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introductiontoryharis
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer scienceRinshad Akbar K K
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessArnab Roy Chowdhury
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt TeachersTedine Soule
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Dennis Deacon
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 

Destaque (19)

Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank Algorithm
 
Seo (Search Engine Optimization)
Seo (Search Engine Optimization)Seo (Search Engine Optimization)
Seo (Search Engine Optimization)
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
Wi vi ppt
Wi vi pptWi vi ppt
Wi vi ppt
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer science
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
 
Yubikey Neo
Yubikey NeoYubikey Neo
Yubikey Neo
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of Business
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
Plagiarism Ppt Teachers
Plagiarism Ppt TeachersPlagiarism Ppt Teachers
Plagiarism Ppt Teachers
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Mais de Edward Iglesias

Mais de Edward Iglesias (16)

Implementing Virtual Reality in an Academic Library
Implementing Virtual Reality in an Academic Library Implementing Virtual Reality in an Academic Library
Implementing Virtual Reality in an Academic Library
 
CLASS Conference 2014
CLASS Conference 2014CLASS Conference 2014
CLASS Conference 2014
 
It came from the Printer
It came from the PrinterIt came from the Printer
It came from the Printer
 
CLC Maker Workshop 2014
CLC Maker Workshop 2014CLC Maker Workshop 2014
CLC Maker Workshop 2014
 
Digital History Class Presentation
Digital History Class PresentationDigital History Class Presentation
Digital History Class Presentation
 
Technologies of Makerspaces
Technologies of MakerspacesTechnologies of Makerspaces
Technologies of Makerspaces
 
CLA Makerspace
CLA  MakerspaceCLA  Makerspace
CLA Makerspace
 
Ccald2
Ccald2Ccald2
Ccald2
 
Cloud presentation NELA
Cloud presentation NELACloud presentation NELA
Cloud presentation NELA
 
Asist mit 2012
Asist mit 2012Asist mit 2012
Asist mit 2012
 
Cloudcomputingday2
Cloudcomputingday2Cloudcomputingday2
Cloudcomputingday2
 
Cloud Computing Day 1
Cloud Computing Day 1Cloud Computing Day 1
Cloud Computing Day 1
 
Digital History Presentation
Digital History PresentationDigital History Presentation
Digital History Presentation
 
Presentation for RILA
Presentation for RILAPresentation for RILA
Presentation for RILA
 
Burrito digital archive system
Burrito digital archive systemBurrito digital archive system
Burrito digital archive system
 
Discovery Layers
Discovery LayersDiscovery Layers
Discovery Layers
 

Último

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Último (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Password Managers and 2 Factor Authentication

  • 1. Password Management and 2 Factor Authentication Because post-its on your desk aren’t enough
  • 3. Go to a website to check it out • http://rumkin.com/tools/password/passchk.p hp
  • 4. More than just entropy • Entropy – 25-GPU cluster cracks every standard Windows password in <6 hours • http://arstechnica.com/security/2012/12/25-gpu- cluster-cracks-every-standard-windows-password-in- 6-hours/ • Not Entropy (Rainbow Tables) – The multi-platform password cracker Ophcrack is incredibly fast. How fast? It can crack the password "Fgpyyih804423" in 160 seconds. – http://www.codinghorror.com/blog/2007/09/rainbow-hash- cracking.html
  • 5. But, you need a separate one for every website so … • You could try an algorithm – Here is one example: The first digit is the number of characters on the name of the website. The second digit is “c” is the number in the first step was odd, and “t” if it was even. The third digit is the last letter of the name of the website. The fourth digit is “$” if the letter in the previous step was a vowel, and “%” if it was a consonant. The last three digits are the first three letters of the name of the website. Using the algorithm above, your password on Twitter would be “7cr%twi” and on Facebook it would be “8tk%fac”. http://www.dailyblogtips.com/develop-an-algorithm-for-your- online-passwords-and-never-forget-one-again/
  • 6. Sane Answer: Password Managers • Keepass http://keepass.info/ • LastPass https://lastpass.com/ • Either better than letting your browser remember it. – Encrypted – Usable across platforms
  • 7. When They Fail • Password Managers are not perfect • Learn to use them • Have a backup plan
  • 8. 2 Factor Authentication – Two-factor authentication is often confused with other forms of authentication. Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. These factors are: • Something the user knows (e.g., password, PIN, pattern); • Something the user has (e.g., ATM card, smart card); and • Something the user is (e.g., biometric characteristic, such as a fingerprint).
  • 9. Examples • You use it already – Conference Room • Online version – Google best example – https://support.google.com/accounts/bin/answer. py?hl=en&answer=180744
  • 10. Why use it • Gives you better protection against online identity theft. • It’s easy. • May someday be required.
  • 11. The Future • Physical Tokens – How it works – With a simple touch of the gold disc, the YubiKey sends a One Time Password (OTP) as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey compliant application.
  • 13. Resources – http://lifehacker.com/184773/geek-to-live-- choose-and-remember-great-passwords – http://lifehacker.com/5505400/how-id-hack-your- weak-passwords – http://lifehacker.com/5944969/which-password- manager-is-the-most-secure – http://en.wikipedia.org/wiki/Two- factor_authentication