1 / 10

Information Security and Cybercrimes

Information Security and Cybercrimes. By Clemente Andre Inocente M.A. & B.S.A (SDSU Alumni) College of Sciences at SDSU Operating Systems Analyst & Information Technology Consultant. What Is The Moral of This Scene?. Supplement Topics To Our Textbook. John the Ripper (Mac, Unix, PC)

gabby
Download Presentation

Information Security and Cybercrimes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security and Cybercrimes By Clemente Andre Inocente M.A. & B.S.A (SDSU Alumni) College of Sciences at SDSU Operating Systems Analyst & Information Technology Consultant

  2. What Is The Moral of This Scene?

  3. Supplement Topics To Our Textbook • John the Ripper (Mac, Unix, PC) • Suggested passwords to use, but really up to the individual • Secured Your Mobile Devices? (e.g. iPads, cell phones, laptops, etc…) • Got Anti-Virus/Spyware? • Automating System Security and monitoring (e.g. scheduled preventive maintenance)

  4. John the Ripper(Mac, Unix, and Windows) • John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords, although Windows LM hashes and a number of other password hash types are supported as well. John the Ripper is free and Open Source software, distributed primarily in source code form. • http://www.openwall.com/john/

  5. Suggested Passwords, But Up To Individual Strong passwords and passphrases contain characters from each of the following four categories: REF: Microsoft Windows Help- Tips for creating strong passwords and passphrases

  6. Suggested Passwords, But Up To Individual(Cont…) • Don’t use names, words found in a dictionary, phone numbers, dates, or simple combinations of these. • Avoid using a pattern of keyboard characters, such as diagonal lines of keyboard keys (for example, njimko). • Use a sequence of random characters. Include a mix of upper- and lowercase letters, numbers, punctuation marks, and (if the site or item allows it) characters typed while holding down the Option key. • While defining a password, use the Password Assistant to see how secure your password is. To open the Password Assistant, click the Key button next to the Password field or the New Password field. • Start with a phrase, verse, or line from a song. Omit some letters, and transform others into numbers or punctuation marks that resemble the original character. You might want to insert additional punctuation and numbers too. • (Cont….) REF: OS X Mountain Lion-Tips for creating secure passwords

  7. Secure Your Mobile Devices?(e.g. iPads, cell phones, laptops, etc…) Password protected/swiping/Face-to-Unlock. Delete: unused apps., saved passwords & user names System updates/PRL (mobile phones) http://www.verizonwireless.com/care/popups/prl.html

  8. Got Antivirus, SDSU Students do • REF: http://www-rohan.sdsu.edu/~download/mcafee.html

  9. Systemizing Security Through Automation and Monitoring(e.g. scheduled preventive maintenance) • OS & Software Automatic Updates (scheduled) • Manually check updates, just like your car. • Got Plug-ins/ Add ons? Check out my site:sci.sdsu.edu/andre-inocente/mmtest.htm

  10. Security Through Automation and Monitoring(e.g. scheduled preventive maintenance) (Cont…)

More Related