PasswordSecurity 2
PasswordSecurity 2
PasswordSecurity 2
Password Hygiene
Somitra Sanadhya
IIT Jodhpur
This set of slides were used for an invited talk in
National Cyber Security Awareness Month - Oct 2022.
1st Nov 2022
Today morning’s email to me
CERT-In : VPN Credentials of 4 users of IIT J are being
sold on dark web
Example:
July 5, 1993
Authentication
Security questions
Passwords
Combining these methods
…
Passwords as authenticator
Easy to use
Example:
Example:
Password: Jigsaw%Quest7trait/fork48
“Passwords are like under wear. You should change them often
(okay, maybe not every day). Don’t share them. Don’t leave
them out for others to see (no sticky notes!). Oh, and they
should be sexy. Wait, sorry, I mean they should be mysterious.
In other words, make your password a total mystery to
others.”
So far …
Strong passwords
Historically, the gap bet ween a breach and its exploit has
been few months, on an average
How to realise that the DB has
been breached ?
Store fake account info in the database
Do not write down your password and stick the paper on your
computer (or near it)
Lessons learned …
https://www.youtube.com/watch?v=aHaBH4LqGsI
https://www.youtube.com/watch?v=8ZX86pVN-l4
(Caution: occasional use of inappropriate language)
somitra@iitj.ac.in
https://sites.google.com/view/somitra