You are on page 1of 9

i t y a n d Pa s s w o rd

Secur
Powerpoint
Computer Science
4th Period
Jr.
By : Robert Jones
fact that a
is recognizing the
Risk acceptance oosing to do nothing about it.
risk exists and chn it will always affect you.)
(doesn't mea
Examples.. One of the biggest
problems with risk
1. Hanging out with avoidance is that you are
troublemakers steering clear of activities
2. Secure Browser
from which you may
3. Clothing
benefit.

to avoid
eans you're trying
Risk avoidance m ents as a w ay to el iminate
compromising evlity exposures.
liabi
Examples..
1. Dog Warning Sign
2. Neighborhood
Watch Sign
3. Caution Sign

The easiest way to


think of Risk Det
think of an eye fo errence is to
r an eye mentalit
y.
Examples..
1. Breathing your
teeth
2. Fire Wall
3. Stair Railing

e risk, you
eps to reduce th
When you take st
itigation.
engage in Risk M
Examples..
1. Breathing your
teeth
2. Fire Wall
3. Stair Railing

lo a d s o m e o f th e risk to another
When you off ce.
y ou e ng a g e in Risk Transferen
party,
Password Change
- Your password
changed every 90 should be
-180 days (3-6 m
onths).

Sharing Password
- You should neve
password with an r share your
yone to ensure th
or devices won’t at your system
be compromised.

Complexity - A m
ix of numbers, up
symbols. percase and lowe
rcase letters, and
Examples:
● Length of the pa
ssword helps be
lower and upperc cause between th
ase letters there e numbers,
variations. are 62 different po
ssible
● Lack of Complex
ity
● Shortness in leng
th
● Use of commonly
used words and
phrases
Authenticatio
n is to prove th
say you are th at you are wh
rough these th o yo
on actually gain
s ree main meth u
when a pers 1. ods.
Authorization is Something
you k
wed to a. Passwordsnow
em and w hat they are allo b. Passcodes
access to a syst c. PIN
d.
a cce ss u n d e r the permissions 2. Use
Something rname
view,motify, and a.
you h
Keycard ave
m b y th e sy st e m administrator. b.
c.
ID’s
granted to the d.
ATM cards
Key
3. Something Fobs
you are
a. Voice
b. Fingerprint
c. Retinal Sca
d. Face Reco n
gnition
1. Multi-Factor Authe
ntication or 2FA
includes combini
least two or three ng at
factors to streng
then the process
living off virtually of
everything limits
yourself
2. 2 Step Authentic
ation includes yo
u signing in and
requires you to se it
nd an email or a
message to your
phone number.
3. User Awareness
- THe wiser the us
er, the less chan
security breaches ce of
. Employee train
ing education, ea
accessible and un sily
derstandable po
licies.

You might also like