SlideShare a Scribd company logo
What’s your Password ???
D-Cipher 1.0 (Strong Passwords)
Top passwords of all times…123456, password, 12345678, lifehack, qwerty, abc123, 111111, monkey, consumer, 12345, 696969, letmein, trustno1,god,love. It has been reported that almost 188,279 passwords were leaked, out of which it was discovered that more than 3,000 users chose "123456" as their login password, making the password top the list of most common passwords.Moreover, nearly 2,000 people chose "password" as their protective word and over 1,000 people decided that "12345678" is an appropriate security choice for them.
Other smart guesses would be…Your parents/partners, child, or pet's name, possibly followed by a 0,1.Digits from your phone number, vehicle etc.Your city, or college, favourite  team name.Date of birth – yours, your partner's or your child's.
Breaches in your Personal SecurityUsing same password for most stuff.Bank websites are mostly quite secure, but most forums, online greeting cards etc. aren't prepared for an attack.So, all we have to do now is unleash Brutus, or any other password cracker on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.Once we've got several login + password pairings we can then go back and test them on targeted sites.But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache.
D-Cipher 1.0 (Strong Passwords)
D-Cipher 1.0 (Strong Passwords)
Other places a hacker can trace your activity Temporary Internet files, Web site cookies, browser history, and index.datTyped URL historySaved passwords and form auto-complete information stored in your browserRecent DocumentsUsage history of: Start/Run, SearchTemporary directories on the hard driveItems contained within the Windows RegistryDeleted items contentsMedia player historyUsing CCleaner or Privacy Eraser.
Must be at least 8 characters long.Never use same passwords for all accounts, rather have a general rule set of generating “unique” passwords.For example, have a base password and then use 1st two consonants and then 1st two vowels of your service provider.Say, base password = uiopFor yahoo it’d be uiopyhaoYou can add numbers and special characters too for enhancing password, like uiOp#01yhao .Guide to choosing Secure Passwords.
Initials of your favorite song or movie, say Pirates of the Caribbean = PotC.Use a pre-established keyboard pattern, like "yui" or "zxcv." Just look at your keyboard to remember it.For extra security, choose an easy to remember base, like "cat" and then shift your fingers up one row on the keyboard when you type it. In the case of "cat," you'd get "dq5."Selecting a base Password
What if One-rule set is compromised ?One can use basic cryptography, as in replace ‘I’ by 1 or !, ‘a’ by @,’o’ by 0,’s’ by $ or &,’e’ by 3 and lots more…Randomly throw in capital letters.Using password managers, they generate errand string from your simple passwords, like “GMLT10AMA” is “1341b4ea8919” and need a master password. Also these passwords are almost irreversible ! But it comes back to squaring one, it all depends how strong is your master password.Always check strength of your passwords, here’s a website : www.passwordmeter.com

More Related Content

PPTX
Shannon and 5 good criteria of a good cipher
PDF
Computer Security Lecture 3: Classical Encryption Techniques 2
PDF
Computer Security Lecture 2: Classical Encryption Techniques 1
PDF
PASSWORD BEST PRACTICES
PPTX
The Top Password Security Trends
PDF
How to choose a password that’s hard to crack
PPT
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
PPTX
Password protection
Shannon and 5 good criteria of a good cipher
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 2: Classical Encryption Techniques 1
PASSWORD BEST PRACTICES
The Top Password Security Trends
How to choose a password that’s hard to crack
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
Password protection

Similar to D-Cipher 1.0 (Strong Passwords) (20)

PDF
Why is password protection a fallacy a point of view
PPTX
Password management
PPTX
Password - Strong and Memorable Passwords
DOC
Protect Your Business With Web Security
PPT
Let me in! 10 tips to better passwords
PDF
How to be safe on the internet. Make the web better!
PDF
‘123456’ worst password of the year 2016
PPTX
P@ssw0rds
PDF
Password Management
PDF
The strategies of password
PDF
Password management for you
PDF
Password Strength Policy Query
PDF
Consumer Password Worst Practices
PDF
Create Strong and Memorable Passwords: 4 Simple Steps
PDF
Be Cyber Smart! (DLH 10/25/2019)
PDF
W make107
PDF
FREE A4 Cyber Security Awareness Posters-Passwords
PDF
Password War Games Webinar
PPTX
Protecting your online identity - Managing your passwords
Why is password protection a fallacy a point of view
Password management
Password - Strong and Memorable Passwords
Protect Your Business With Web Security
Let me in! 10 tips to better passwords
How to be safe on the internet. Make the web better!
‘123456’ worst password of the year 2016
P@ssw0rds
Password Management
The strategies of password
Password management for you
Password Strength Policy Query
Consumer Password Worst Practices
Create Strong and Memorable Passwords: 4 Simple Steps
Be Cyber Smart! (DLH 10/25/2019)
W make107
FREE A4 Cyber Security Awareness Posters-Passwords
Password War Games Webinar
Protecting your online identity - Managing your passwords
Ad

Recently uploaded (20)

PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Lesson notes of climatology university.
PPTX
Cell Structure & Organelles in detailed.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Computing-Curriculum for Schools in Ghana
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Cell Types and Its function , kingdom of life
202450812 BayCHI UCSC-SV 20250812 v17.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Complications of Minimal Access Surgery at WLH
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Lesson notes of climatology university.
Cell Structure & Organelles in detailed.
O7-L3 Supply Chain Operations - ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
Weekly quiz Compilation Jan -July 25.pdf
Final Presentation General Medicine 03-08-2024.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Cell Types and Its function , kingdom of life
Ad

D-Cipher 1.0 (Strong Passwords)

  • 3. Top passwords of all times…123456, password, 12345678, lifehack, qwerty, abc123, 111111, monkey, consumer, 12345, 696969, letmein, trustno1,god,love. It has been reported that almost 188,279 passwords were leaked, out of which it was discovered that more than 3,000 users chose "123456" as their login password, making the password top the list of most common passwords.Moreover, nearly 2,000 people chose "password" as their protective word and over 1,000 people decided that "12345678" is an appropriate security choice for them.
  • 4. Other smart guesses would be…Your parents/partners, child, or pet's name, possibly followed by a 0,1.Digits from your phone number, vehicle etc.Your city, or college, favourite team name.Date of birth – yours, your partner's or your child's.
  • 5. Breaches in your Personal SecurityUsing same password for most stuff.Bank websites are mostly quite secure, but most forums, online greeting cards etc. aren't prepared for an attack.So, all we have to do now is unleash Brutus, or any other password cracker on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.Once we've got several login + password pairings we can then go back and test them on targeted sites.But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser's cache.
  • 8. Other places a hacker can trace your activity Temporary Internet files, Web site cookies, browser history, and index.datTyped URL historySaved passwords and form auto-complete information stored in your browserRecent DocumentsUsage history of: Start/Run, SearchTemporary directories on the hard driveItems contained within the Windows RegistryDeleted items contentsMedia player historyUsing CCleaner or Privacy Eraser.
  • 9. Must be at least 8 characters long.Never use same passwords for all accounts, rather have a general rule set of generating “unique” passwords.For example, have a base password and then use 1st two consonants and then 1st two vowels of your service provider.Say, base password = uiopFor yahoo it’d be uiopyhaoYou can add numbers and special characters too for enhancing password, like uiOp#01yhao .Guide to choosing Secure Passwords.
  • 10. Initials of your favorite song or movie, say Pirates of the Caribbean = PotC.Use a pre-established keyboard pattern, like "yui" or "zxcv." Just look at your keyboard to remember it.For extra security, choose an easy to remember base, like "cat" and then shift your fingers up one row on the keyboard when you type it. In the case of "cat," you'd get "dq5."Selecting a base Password
  • 11. What if One-rule set is compromised ?One can use basic cryptography, as in replace ‘I’ by 1 or !, ‘a’ by @,’o’ by 0,’s’ by $ or &,’e’ by 3 and lots more…Randomly throw in capital letters.Using password managers, they generate errand string from your simple passwords, like “GMLT10AMA” is “1341b4ea8919” and need a master password. Also these passwords are almost irreversible ! But it comes back to squaring one, it all depends how strong is your master password.Always check strength of your passwords, here’s a website : www.passwordmeter.com