Computer, Email, and Password Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 65

IT.

E 2

Computer and Internet


Security:
E-mail & Passwords
IT.E 2

expands much further


away from your laptop
IT 123

Full Name - Login


Photo - Password
IT 123

Statistics Show

11 hours online per day


Most of the sites or online
resources people use daily—
from social networks to email—
are secured using a simple
password
https://www.teamsid.com/the-importance-
of-having-a-secure-password-infographic
IT.E 2

most common
passwords list
IT.E 2

How your Password


can be hacked
IT 123

Statistics Show

Guessing
Dictionary
Brute force
- like dictionary , often
done online https://www.teamsid.com/the-importance-
of-having-a-secure-password-infographic
What makes a good IT 123

password

Easy enough to
remember
Use at least 10 characters
https://www.teamsid.com/the-importance-
of-having-a-secure-password-infographic
What makes a good IT 123

password

591 days to crack


a 10 character
password
What makes a good IT 123

password

use a mixture of
character and cases
Avoid names of any
kind
Password Check IT 123

Metrix

Fav quote
line form a song
a Bible verse
you will become
what you believe.

Ywbwyb12#4
i can buy
myself flowers
!cnbymyslfflwrs00
&weknowthatromans828
And we know that all things work
together for good. to them that love
God, to them who are the called.
according to his purpose.
Romans 8:28
Password Managers
Password Managers IT 123

Password managers are offline


software or online services
that keep all your passwords
and input them into login
forms to login.
Types of password IT 123

managers

Cloud password managers


On-premise password
managers
Mobile password managers
Browser-based password
managers
Single Sign-On
Cloud password IT 123

managers

centrally hosted and maintained by the


service provider
Can be scaled up or down to match the
team's growth
Help promote safe collaboration in teams
working from multiple locations
The security of the user data is directly
dependent on the choice of the service
provider
On-premise password IT 123

managers
Privately hosted and maintained to avoid
external threats
Helpful for teams that require access to
passwords even in the absence of a stable
internet connection
Additional overhead costs involving
maintenance, deployment, and infrastructure
upgrades
Longer implementation time as solutions must be
manually deployed
Mobile password IT 123

managers
Easy to get started
Instant access to passwords, from anywhere
in the world
Free of cost (included in price of mobile
device)
Limited to personal use due to lack of
extensive features
Passwords can't be synced across devices
operating on different platforms
Browser-based IT 123

password managers
Easy to get started and manage
Supports password autofill and auto-saves
new account credentials
Free of cost
Limited to personal use due to lack of
extensive features
Passwords can't be synced across different
browsers
Unsafe on shared devices on which multiple
users can access browsers
IT 123

Single Sign-On

SSO helps businesses enable password less


authentication for their teams
Improve user productivity and remote work systems
Improve the user's password hygiene by reducing
the number of passwords they manage
Access to all your accounts depends on your SSO
provider
Vulnerable to external threats as access to multiple
accounts are accessible from a single point
Generally on the pricier side
two great features that make for
strong protection

the ability to generate random


and complex passwords
the ability to automatically log
the user

IT 123

LastPass

LastPass uses an access anywhere server


based storage model the free version
provides basic functionality, including
one click login, automatic form-filling,
cross-browser synchronization and
secure password generation
IT 123

Roboform

Roboform is one of the most flexible vault services


around.
It's available in a limited functionality free version,
providing an encrypted password store for 10 logins
and an auto fill function.
But for unlimited logins you'll need the desktop
version with a paid plan.
IT 123

Keepas

KeePass is primarily a local client and it


supports you Ubikeys for two-factor
authentication, and a staggering number of
platforms including Linux.
Since it's open source there are also a ton of
third-party plugins available to add features.
Strong Master IT 123

Password

Double Encryption
Fingerprint
Automatic Log in
IT 123

Extra Protection
Layers
Two-factor IT 123

authentication

is the process of verifying


someone’s identity with two
out of three possible
identifiers
IT 123

The Access Token

allow an application to access an


API. The application receives an
access token after a user
successfully authenticates and
authorizes access, then passes the
access token as a credential when it
calls the target API
IT 123

The passphrase

A passphrase is a sequence of words


or other text used to control access to
a computer system, program or data.
It is similar to a password in usage,
but a passphrase is generally longer
for added security.
3 Primary types of IT 123

Offline Token

one-time passwords
sequence based token
time based token
Sequence-based IT 123

token

list of pre-agreed
numbers/phrase
IT 123

One-time password

delivered to a user via an


SMS or automated call.

Signal System 7 Breach


Time-based IT 123

password

generates a one-time
password that uses the
current time as a source of
uniqueness
Google Authenticator
IT 123

Biometrics

facial recognition,
fingerprints, the vein
pattern, your unique iris
print or your retinal pattern.
Email security
IT 123

There are over 200 billion


emails sentworldwide
every day. An average
office over 150 emails per
day
How does one tell that an email
is legit and is sent by whoever
it says it was sent by
IT 123

Headers

contain information about the


routing of the message and the
original IP address of the message.
they can be used to trace the
original source of an email
3 easy steps you can do to IT 123

verify links in emails

Look at the pop-up


Look at the copied URL
Look into the message HTML
source
IT 123

Email encryption

Encryption techniques make it


possible to turn email contents
into gibberish and only lets the
recipient decode the email and
read it
IT 123

Email encryption

The connection from your email


provider;
Your actual email messages;
Your stored, or archived email
messages.
Encrypting your messages before
sending makes them unreadable
from the point at which they start
their journey to the point at which
the intended recipient opens
them.
How to Encrypt Email
Connections
IT 123

Email encryption

To secure the connection between


your email provider and your
computer or other device, you
need to set up the SSL -- Secure
Socket Layer and TLS -- Transport
Layer Security encryption
IT 123

HTTPS Everywhere

force the encrypted connections


to all the websites that support it.
FlowCrypt For IT 123

Gmail
force the encrypted connections
to all the websites that support it.
FlowCrypt For IT 123

Gmail
Go to Chrome settings.
Choose "Extensions"
Scroll down and go to Chrome
Web Store.
Search for FlowCrypy
Add it to Chrome
Add extension
FlowCrypt For IT 123

Gmail
Go to Chrome settings.
Choose "Extensions"
Scroll down and go to Chrome
Web Store.
Search for FlowCrypy
Add it to Chrome
Add extension
Cipher Text
Substitution IT 123

Technique

Caesar Cipher
Mono Alphabetic Cipher
Homophonic Substitution Cipher
Polygram Substitution Cipher
IT 123

Ceasar Cipher

characters of plain text is


replaced by other characters with
same pattern
Mono Alphabetic IT 123

Cipher

a substitution cipher in which for a


given key
Homophonic IT 123

Substitution Cipher

one plain text alphabet can map


to more than one cipher text
alphabe
Polygram IT 123

Substitution Cipher

one plain text alphabet can map


to more than one cipher text
alphabet
IT 123

Vigenere Cipher

uses multiple character keys. Each


of the keys encrypts one single
character. Each character is
replaced by a number (A=0, B=1,
…Z=25). After all keys are used,
they are recycled. For encryption,
Formula used : E=(M+K)mod 26
Transposition IT 123

Technique

Rail Fence Technique


Simple Columnar Transposition
Technique
Vernam Ciper
Rail Fence IT 123

Technique
Write down plain text as sequence
of diagonals
Plain text: Cipher text :
BUPC BSIT bpbiucst
b p b i
u c s t
IT 123

Simple Columnar

text message row by row


in predefined columns.
IT 123

Simple Columnar
Plain text: BUPC BSIT
Cipher text : PIUSCTBB

C1 C2 C3 C4
B U P C
B S I T
IT 123

Vernam Cipher
Plain text: BUPC BSIT
Key : ABFDOPTI

B U PC B S I T
+
ABFDOPTI

Subtract 26 if >26:
Cipher text :

IT 123

Vernam Cipher

ABCDEFGHI J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
IT 123

Vernam Cipher
ABCDEFGHI J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Plain text: Lorem ipsum dolor sit amet


Key : Q u w i f p q r s t y u b g j q q e t u i l

Rail Fence Technique


Plain text:
BUPC BSIT

You might also like