Sie sind auf Seite 1von 20

Queens'

College
Computer
project
2014-15
Submitted by:
harmeet chhabra
X-B

Queens'
College
Computer
project
2014-15
Submitted by:
Priyal Narang
X-B

secure passwords

In general, when you want to


protect something, you lock it
up with a key. Houses, cars and
bicycle locks all have physical
keys; protected files
haveencryption bank cards
have PIN numbers; and email
accounts have passwords. All of
these keys, physical and
electronic, have one thing in
common: they open their
respective locks just as
effectively in the hands of
somebody else. You can install
advanced firewalls, secure email
accounts, andencrypteddisks,
but if your password is weak, or
if you allow it to fall into the

Elements
of a strong
password

1. Make it long:
The longer a password is, the
less likely it is that a computer
program would be able to guess
it in a reasonable amount of
time. You should try to create
passwords that include ten or
more characters. Some people
This use passwords that contain
more than one word, with or
without spaces between them,
which are often called as
passphrases. is a great idea, as
long as the program or service
you are using allows you to
choose long enough passwords.

2. Make it unique:Avoid using the same


password for more than one account. Otherwise,
anyone who learns that password will gain access
to even more of your sensitive information. This
is particularly true because some services make
it relatively easy to crack a password. If you use
the same password for your Windows user
account and your Gmail account, for example,
someone with physical access to your computer
can crack the former and use what they learn to
access the latter. For similar reasons, it is a bad
idea to rotate passwords by swapping them
around between different accounts.
3. Keep it fresh:Change your password on a
regular basis, preferably at least once every

1. Common Password Mistakes


Cyber criminals use sophisticated
tools that can rapidly decipher
passwords. Your passwords wont be
secure if you make these common
mistakes:
2. Using dictionary words
Dictionary words in all languages are
vulnerable.
3. Using words that are spelled
backward
Don't use common words or
acronyms (spelled forwards or
backwards). Words in all languages
are vulnerable.
4. Using sequences or repeated
characters.
Using adjacent characters, that are
found on your keyboard is asking for
trouble. Examples include: abcdefg,
12345678, qwerty, qazwsxedc.

5. Using personal
information.
Your name,social
securitynumber, birth
date, driver's license
number,passportnumber,
etc, or variations of the
same.
6. Using common
passwords
Examples include: admin,
letmein , guest,
qazwsxedc ,n, password,
7. Writing down
passwords or sharing it

Cybercrimes Against
Society at large

An unlawful act done with the intention of causing


harm to the cyberspace will affect large number of
persons. These offences includes:
Child Pornography:It involves the use of
computer networks to create, distribute, or access
materials that sexually exploit underage children. It
also includes activities concerning indecent exposure
and obscenity.
Cyber Trafficking:It may be trafficking in drugs,
human beings, arms weapons etc. which affects
large number of persons. Trafficking in the
cyberspace is also a gravest crime.
Online Gambling:Online fraud and cheating is one
of the most lucrative businesses that are growing
today in the cyber space. There are many cases that
have come to light are those pertaining to credit card
crimes, contractual crimes, offering jobs, etc.
Financial Crimes:This type of offence is common
as there is rapid growth in the users of networking
sites and phone networking where culprit will try to
attack by sending bogus mails or messages through
internet. Ex: Using credit cards by obtaining
password illegally.
Forgery:It means to deceive large number of
persons by sending threatening mails as online
business transactions are becoming the habitual
need of todays life style.

Affects To Whom:Cyber Crimes always affects


the companies of any size because almost all
the companies gain an online presence and take
advantage of the rapid gains in the technology
but greater attention to be given to its security
risks. In the modern cyber world cyber crimes is
the major issue which is affecting individual as
well as society at large too.
Need of Cyber Law:information technology
has spread throughout the world. The computer
is used in each and every sector wherein
cyberspace provides equal opportunities to all
for economic growth and human development.
As the user of cyberspace grows increasingly
diverse and the range of online interaction
expands, there is expansion in the cyber crimes
i.e. breach of online contracts, perpetration of
online torts and crimes etc. Due to these
consequences there was need to adopt a strict
law by the cyber space authority to regulate
criminal activities relating to cyber and to
provide better administration of justice to the
victim of cyber crime. In the modern cyber
technology world it is very much necessary to
regulate cyber crimes and most importantly
cyber law should be made stricter in the case of
cyber terrorism and hackers.

Passwords in the Context


of Your Identity and
Privacy
What is a password?
A password is information associated
with an entity that confirms the
entitys identity.1
Why are passwords needed?
Passwords are used for authentication
Authentication can be thought of as
the act of linking yourself to your
electronic identity within the
system you are connecting to
Your password is used to verify
to the system that you are the
legitimate owner of the
user/account identifier
Commonly referred to as logging
in

Password Facts worth


Remembering

Protection of Your Identity and Privacy in


the information age hinges on sound
password knowledge and practice
Those who do not use strong passwords
and password practices are often their own
worst enemy
If you feel you have too many passwords
to remember then consider using a
password vault (e.g., Password Safe)
The risks are real, they affect you either
directly or indirectly and they can be
diminished by using strong passwords
and password practices

According to ablog post


published by Trust wave, the
statistics for the types of login
credentials contained within
the criminal database broke
down as follows:
1. Approx 1,580,000 website
login credentials stolen
2. Approx 320,000 email
account credentials stolen
3. Approx 41,000 FTP account
credentials stolen
4. Approx 3,000 Remote
Desktop credentials stolen

5. Approx 3,000 Secure Shell


account credentials stolen

Whats happened here is clear.


Innocent users computers have
become infected with malware,
which grabbed login details as
they were entered by users.
This data was then transmitted
to the cybercriminals either so
they could access the accounts
themselves or (more likely) sell
on the details to other online
criminals.
And the consequences of such a
security breach happening on
your computer are clear, as the
following list of domains most
commonly found in the haul
shows.

Almost 2 million stolen


passwords uncovered
in cybercrime haul

Self-Test
Remember, better understanding

leads to better protection of

our
Password
our
Identity
our Privacy

Do not cheat Yourself

Conclusion
Since
Sinceusers
usersof
ofcomputer
computersystem
system
and
andinternet
internetare
areincreasing
increasing
worldwide,
worldwide,where
whereititisiseasy
easyto
to
access
accessany
anyinformation
informationeasily
easily
within
withinaafew
fewseconds
secondsby
byusing
using
internet
internetwhich
whichisisthe
themedium
medium
for
huge
information
and
a
for huge information and a
large
base
of
communications
large base of communications
around
the
world.
Certain
around the world. Certain
precautionary
precautionarymeasures
measuresshould
should
be
betaken
takenby
bynet
netcitizens
citizenswhile
while
using
usingthe
theinternet
internetwhich
whichwill
will
assist
assistininchallenging
challengingthis
thismajor
major
threat
threatCyber
CyberCrime.
Crime.

Thank you

Das könnte Ihnen auch gefallen