1 of 12

Slide Notes

FSU Staff Training
Oct 24, 2016
UC Berkeley School of Law
DownloadGo Live

Passwords: Strategies and Tools

Published on Oct 19, 2016

No Description

PRESENTATION OUTLINE

PASSWORDS

Strategies and Tools
FSU Staff Training
Oct 24, 2016
UC Berkeley School of Law

What's the problem?

Things protected by password increase continuosly

Each time, more important things

Balance between convenience and security

We end up with passwords complicated to remember for humans and easy to find by computers
Photo by Eneas

STRATEGIES

Coming up with good passwords
What makes a password a good one?

How do you deal with password creation?
Photo by Matti Mattila

SOME IDEAS

Good and not so good ones
Let's share some good ideas and some bad ones so we start replacing our weak passwords if we have any

2 Examples

Iw20yatS.Pttbtp / Llomffoml.Msms
Songs and books can create something random that's easy to remember for you and impossible to guess for anybody else

Hint for password 1: Really, really famous Beatles song featuring a Sargent

Hint for password 2: Vladimir Nabokov fans, rejoice

Passphrases

Desk-Wall-Road-Portrait
Songs and books can create something random that's easy to remember for you and impossible to guess for anybody else

Hint for password 1: Really, really famous Beatles song featuring a Sargent

Hint for password 2: Vladimir Nabokov fans, rejoice

TOOLS

To help us manage this craziness
Post-it on your monitor

Notebook with passwords

Document or Note with passwords (password-protected?)

Password Manager
Photo by Emily Barney

Password Managers

What are they?

They can also create your secure password!

Life-changing!

How do they work?

Dashlane, LastPass, 1Password, etc
What are they? How do they help? How do they work?

Demo (password creation and login fill)

Multi-browser, multi-plattform

What about 2FA?

Two-Factor Authentication
What is it?

Examples we've all used: ATMs

Can be enabled for cloud services like Google, Dropbox, Box, AppleID

2FA
Something You Know
Something You Have
Something You Are
(Pick two)

You Know: PIN, passwords, security questions

You Have: card, phone, token

You Are: fingerprint, retina, face, voice

Thanks!

Israel Vela
Instructional Technologist
UC Berkeley School of Law