SlideShare a Scribd company logo
Unit-2
Password Selection,Piggybacking,shoulder
surfing
Password
 On computer systems where multiple users share disk
space and system resources, each user is given a
computer account.
 How does the system know who is authorized to access
and use this account?
 The user enters a password. If the user enters the
correct password, access is granted.
 When you first get your account, some computer
systems assign a password to you and you can't
change it, but on the vast majority of systems, including
the UNIX workstations in, it is up to the user to select a
password for his or her account.
 Selecting a strong password is the single most
important thing you can do to protect your information
from unauthorized access.
Need of Strong Password
 if your computer system is connected
to the internet, and almost all are
today, anyone in the world who can
connect to the internet can attempt to
access your account by guessing your
password.
 All that is needed is your account
name or id, and this information isn't
difficult to obtain on many computer
systems.
How to choose a strong
password
 uSE BoTh UppEr and loWEr Case
Characters, digits, punctuation, and
!@#$%^&* characters (and not just as the
last character of you password only) if your
computer system allows it. The more
complex and random the password is, the
harder it is to crack.
How to choose a strong
password
 You should try to choose a password that
uses the maximum number of characters
allowed. On UNIX systems, the maximum
password length is 8 characters. As a
minimum your password should be 6
characters.
 Change your password regularly
 Beware of people hanging over your
shoulder when you type your pas
 Don't use a word in the English dictionary or
a minor variation on that word.sword.
How to choose a strong
password
 Never tell your password to anyone.
 Never write your password down.
 Don't use simple patterns of adjacent
letters on the keyboard.(zxcvb etc.)
Shoulder Surfing
 Shoulder surfing refers to a direct observation,
such as looking over a person's shoulder, to
obtain information.
 In some cases shoulder surfing is done for no
reason other than to get an answer, but in other
instances it may constitute a security breach as
the the person behind may be gleaning private
information such as your PIN at a bank machine,
or Credit card information as you enter it into
 a Web based shopping cart check-out. While
shoulder surfing is most common in busy and
crowed areas where the perpetrator is not as
likely to be caught, shoulder surfing can also be
done with the aid of cameras from a more remote
location.
Shoulder Surf
Shoulder Surf-Prevention
 it is advised to shield paperwork or the
keypad from view by using one’s body
or cupping one’s hand.
 When working on a laptop, ensure that
your back is to a wall with no open
sides close to you or to enter your
passwords in a secluded location.
Piggybacking
 Piggybacking, in a wireless
communications context, is the
unauthorized access of a wireless
LAN.
 The usual purpose of piggybacking is
simply to gain free network access
rather than any malicious intent, but it
can slow down data transfer for
legitimate users of the network.
Piggybacking
 It's quite simple to access an unsecured
wireless network: All you have to do is
get into the range of a Wi-
Fi hotspot's signal and select your
chosen network from the options
presented.
 However, unauthorized network access,
even to free Wi-Fi, may be illegal. People
have been fined for accessing hot spots
from outside businesses, such as coffee
shops, that provide free Wi-Fi for
Piggybacking -Prevention
 To protect your network from
piggybacking, ensure that encryption is
enabled for yourrouter.
 Use Wireless Encryption Protocol (WEP)
if that's your only option, but if possible
use Wireless Protected Access (WPA) or
WPA2.
 Use a strong password for your
encryption key, consisting of at least 14
characters and mixing letters and
numbers.

More Related Content

PPTX
Wi-FI Hacking
PPT
Network devices
PPT
Network security and protocols
PPTX
Gateway and firewall
PPTX
Hypertext transfer protocol (http)
PPTX
Email security - Netwroking
Wi-FI Hacking
Network devices
Network security and protocols
Gateway and firewall
Hypertext transfer protocol (http)
Email security - Netwroking

What's hot (20)

PPTX
Firewall basics
PPTX
Cyber security
PPTX
Wireless and mobile security
PPTX
Encryption and Tokenization: Friend or Foe?
PDF
Email - Electronic Mail
PPTX
Web application attacks
PPT
Types of attacks and threads
PDF
Control Panel Hosting
PPTX
PHISHING PROJECT REPORT
PPTX
Internet Service Provider-ISP
PPTX
Pengantar Administrasi Infrastruktur Jaringan kelas 12.pptx
PPTX
Security services
PPTX
Virtual Private Networks (VPN) ppt
PPT
Proxy Servers
PPT
Firewall & its configurations
PPT
Routing
PPTX
Database security
PPTX
Firewall and Types of firewall
PPSX
PPT
Firewall basics
Cyber security
Wireless and mobile security
Encryption and Tokenization: Friend or Foe?
Email - Electronic Mail
Web application attacks
Types of attacks and threads
Control Panel Hosting
PHISHING PROJECT REPORT
Internet Service Provider-ISP
Pengantar Administrasi Infrastruktur Jaringan kelas 12.pptx
Security services
Virtual Private Networks (VPN) ppt
Proxy Servers
Firewall & its configurations
Routing
Database security
Firewall and Types of firewall
Ad

Viewers also liked (20)

PPTX
Security Training: #2 Cryptography Basics
PPTX
PPTX
Security Training: #1 What Actually a Security Is?
PPT
Bluetooth Hacking
PPTX
Cyber crimes and its security
PPT
The Role of People Management, Performance and Incentives in more effective L...
PDF
Applied Cryptography
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPT
Concept of hashing
PPT
Ch17 Hashing
PDF
Hashing and Hash Tables
PPT
Hashing PPT
PPTX
Cyber crime types & laws
PPTX
Security in Computer System
PPSX
8 Access Control
PPSX
Network security ppt
PPT
Hashing
PPT
Need And Importance Of Cyber Law
PPT
Network Security 1st Lecture
PPTX
biometrics
Security Training: #2 Cryptography Basics
Security Training: #1 What Actually a Security Is?
Bluetooth Hacking
Cyber crimes and its security
The Role of People Management, Performance and Incentives in more effective L...
Applied Cryptography
Computer Security and Intrusion Detection(IDS/IPS)
Concept of hashing
Ch17 Hashing
Hashing and Hash Tables
Hashing PPT
Cyber crime types & laws
Security in Computer System
8 Access Control
Network security ppt
Hashing
Need And Importance Of Cyber Law
Network Security 1st Lecture
biometrics
Ad

Similar to Password selection,piggybacking- (20)

PDF
Why is password protection a fallacy a point of view
PPTX
Network Security
PPTX
TheInternetDigitalSecurityfddreeere.pptx
PDF
Cybersecurity Awareness Infographics
PDF
NWSLTR_Volume5_Issue2
DOCX
How to keep Your Gadgets Safe When Travelling
PPTX
Personal Internet Security System
PDF
a)In the words of Snowden properly Imlemented strong crypto system.pdf
PDF
Wireless security
PPTX
about cyber bullying -Presentation1.pptx
PDF
Cybersecurity Interview Questions_Part1.pdf
DOCX
Giarritano concept paper 4
PPT
How To Hack Wireless Internet Connections
PPT
Network security-1195284736736860-4
PPTX
Network and system administration Chapter 5.pptx
PDF
Why is password protection a fallacy a point of view
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PDF
How To Secure Online Activities
PDF
Employee Security Awareness Program
PPT
Information Secuirty
Why is password protection a fallacy a point of view
Network Security
TheInternetDigitalSecurityfddreeere.pptx
Cybersecurity Awareness Infographics
NWSLTR_Volume5_Issue2
How to keep Your Gadgets Safe When Travelling
Personal Internet Security System
a)In the words of Snowden properly Imlemented strong crypto system.pdf
Wireless security
about cyber bullying -Presentation1.pptx
Cybersecurity Interview Questions_Part1.pdf
Giarritano concept paper 4
How To Hack Wireless Internet Connections
Network security-1195284736736860-4
Network and system administration Chapter 5.pptx
Why is password protection a fallacy a point of view
Cybersecurity Awareness E-Book - WeSecureApp
How To Secure Online Activities
Employee Security Awareness Program
Information Secuirty

Password selection,piggybacking-

  • 2. Password  On computer systems where multiple users share disk space and system resources, each user is given a computer account.  How does the system know who is authorized to access and use this account?  The user enters a password. If the user enters the correct password, access is granted.  When you first get your account, some computer systems assign a password to you and you can't change it, but on the vast majority of systems, including the UNIX workstations in, it is up to the user to select a password for his or her account.  Selecting a strong password is the single most important thing you can do to protect your information from unauthorized access.
  • 3. Need of Strong Password  if your computer system is connected to the internet, and almost all are today, anyone in the world who can connect to the internet can attempt to access your account by guessing your password.  All that is needed is your account name or id, and this information isn't difficult to obtain on many computer systems.
  • 4. How to choose a strong password  uSE BoTh UppEr and loWEr Case Characters, digits, punctuation, and !@#$%^&* characters (and not just as the last character of you password only) if your computer system allows it. The more complex and random the password is, the harder it is to crack.
  • 5. How to choose a strong password  You should try to choose a password that uses the maximum number of characters allowed. On UNIX systems, the maximum password length is 8 characters. As a minimum your password should be 6 characters.  Change your password regularly  Beware of people hanging over your shoulder when you type your pas  Don't use a word in the English dictionary or a minor variation on that word.sword.
  • 6. How to choose a strong password  Never tell your password to anyone.  Never write your password down.  Don't use simple patterns of adjacent letters on the keyboard.(zxcvb etc.)
  • 7. Shoulder Surfing  Shoulder surfing refers to a direct observation, such as looking over a person's shoulder, to obtain information.  In some cases shoulder surfing is done for no reason other than to get an answer, but in other instances it may constitute a security breach as the the person behind may be gleaning private information such as your PIN at a bank machine, or Credit card information as you enter it into  a Web based shopping cart check-out. While shoulder surfing is most common in busy and crowed areas where the perpetrator is not as likely to be caught, shoulder surfing can also be done with the aid of cameras from a more remote location.
  • 9. Shoulder Surf-Prevention  it is advised to shield paperwork or the keypad from view by using one’s body or cupping one’s hand.  When working on a laptop, ensure that your back is to a wall with no open sides close to you or to enter your passwords in a secluded location.
  • 10. Piggybacking  Piggybacking, in a wireless communications context, is the unauthorized access of a wireless LAN.  The usual purpose of piggybacking is simply to gain free network access rather than any malicious intent, but it can slow down data transfer for legitimate users of the network.
  • 11. Piggybacking  It's quite simple to access an unsecured wireless network: All you have to do is get into the range of a Wi- Fi hotspot's signal and select your chosen network from the options presented.  However, unauthorized network access, even to free Wi-Fi, may be illegal. People have been fined for accessing hot spots from outside businesses, such as coffee shops, that provide free Wi-Fi for
  • 12. Piggybacking -Prevention  To protect your network from piggybacking, ensure that encryption is enabled for yourrouter.  Use Wireless Encryption Protocol (WEP) if that's your only option, but if possible use Wireless Protected Access (WPA) or WPA2.  Use a strong password for your encryption key, consisting of at least 14 characters and mixing letters and numbers.