Top Banner
Greater Wheeling AITP November 12, 2014
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Greater Wheeling AITP Web Security

Greater Wheeling

AITPNovember 12, 2014

Page 2: Greater Wheeling AITP Web Security

You, Security

AND

Everybody Else

Page 3: Greater Wheeling AITP Web Security

This presentation is about protecting yourself on

the web.

I am not an expert!

“Expert” is Latin for Old Drip

Page 4: Greater Wheeling AITP Web Security

Just how big is “The Web?”

Page 5: Greater Wheeling AITP Web Security
Page 6: Greater Wheeling AITP Web Security
Page 7: Greater Wheeling AITP Web Security

Big Big Numbers!

BIG

Opportunities!!

Page 8: Greater Wheeling AITP Web Security

Passwords are the

weakest link in

security!

Page 9: Greater Wheeling AITP Web Security

Top 4 Weakest Password in 2014

123456

password

12345678

qwerty

YIKES!

Page 10: Greater Wheeling AITP Web Security

How long to crack a password?

8 Letters = 60 seconds or less

8 Letters & Numbers = 11 minutes

12 Letters, Numbers, Caps, Lower Case

Special Characters = 2,000 Years

Page 11: Greater Wheeling AITP Web Security

Question

How many people have the same password for their email

AND online banking?

OR

Similiar password?

Page 12: Greater Wheeling AITP Web Security

So, what to do, what to do?

from: yourwebsiteengieer.com

Create unique passwords for every online account that

contain numbers, letters and symbols

Don’t use passwords that have dictionary words

Don’t use personal information like birthdays or phone

numbers

Avoid making passwords that have adjacent keyboard

combinations, like qwerty or asdfqwer

Never use your email password for any other online

accounts

Page 13: Greater Wheeling AITP Web Security

2FA

Wikipedia defines Two-factor authentication provides

unambiguous identification of users by means of the combination

of two different components. These components may be

something that the user knows, something that the user possesses

or something that is inseparable from the user. A good example

from everyday life is the withdrawing of money from a cash

machine. Only the correct combination of a bank card (something

that the user possesses) and a PIN (personal identification

number, i.e. something that the user knows) allows the transaction

to be carried out.

Page 14: Greater Wheeling AITP Web Security

Password Apps

LastPass

https://lastpass.com

1PassWord

https://agilebits.com/onepassword

Page 15: Greater Wheeling AITP Web Security

DEMO

Page 16: Greater Wheeling AITP Web Security

Website Security

Page 17: Greater Wheeling AITP Web Security

Google Authenticator

Page 18: Greater Wheeling AITP Web Security
Page 19: Greater Wheeling AITP Web Security
Page 20: Greater Wheeling AITP Web Security

Two-factor from the future.

With Clef, the often painful process of logging into a site

feels, admittedly, a little bit magical.

getclef.com

Page 21: Greater Wheeling AITP Web Security
Page 22: Greater Wheeling AITP Web Security

Questions