How two-factor authentication can help

Two-Factor Authentication & Tools
for Password Management
August 29, 2014
Pang Chamreth, IT
Development Innovations
1
Objectives
•
•
•
•
•
•
Understand what is two-factor authentication
Define how to enable two-factor authentication for
Understand how to setup step by step
Understand most common worst password
Know how to securing your password
Understand what is password management
Pang Chamreth, IT
Development Innovations
2
What is Two-Factor Authentications
• Two-factor authentication adds a second level of
authentication to an account log-in.
• Two-factor authentication is used to increase security
by requiring:
“Something you know”
Pang Chamreth, IT
Development Innovations
AND “Something you have”
3
How to enable two factor
authentications for:
•
•
•
•
•
•
•
LinkedIn
Twitter
Microsoft
Apple
Google
Yahoo
Dropbox
Pang Chamreth, IT
Development Innovations
4
Benefits of Two-Factor Authentications
• Stronger security
• When logging in to your account, after typing in your
username and password, a second password sent to
you via text.
• If a hacker gets your username and password they
still won’t be able to get in to your account.
Pang Chamreth, IT
Development Innovations
5
Does loss of
control over
your email?
Pang Chamreth, IT
Development Innovations
6
How two-factor authentication can help
•
•
•
•
Can recovery your email’s password
Can protect your account from hacker
Easy to used with 1st password & 2nd mobile
See the practice to use 2-step verification on your
google account
Pang Chamreth, IT
Development Innovations
7
Practices to used two- factor authentication
Practices to used two- factor authentication with google
account.
Set up 2- Step Verifications
Pang Chamreth, IT
Development Innovations
8
2-step verification
Help to prevent hacker that try to use your account
when they know your username and password.
For best practices we will set up 2-Step Verification in
Gmail account.
Pang Chamreth, IT
Development Innovations
9
Why you should use 2-Step Verification
2-Step Verification adds an extra layer of security to
your Google Account, drastically reducing the chances
of having the personal information in your account
stolen.
To break into an account with 2-Step Verification,
hacker would not only have to know your username and
password, they'd also have to get a hold of your phone.
Pang Chamreth, IT
Development Innovations
10
How it work
• Enter your password
• Enter a code from your phone
• Keep it simple
Pang Chamreth, IT
Development Innovations
11
Set up 2-Step Verification
Sign in to your Google Account settings page by
clicking on your name or picture in the upper right
corner of the screen and then clicking Account.
Pang Chamreth, IT
Development Innovations
12
See Setup process
• At the top, click Security tab
• In the Password box, click Setup next to “2-Step
verification” This will bring your to the 2-Step
Verification settings page.
• You will then see a step-by-step guide which will help
you through the setup process.
Pang Chamreth, IT
Development Innovations
13
Set up a backup
• Once you’re done, you’ll be taken to the 2-Step
Verification settings page again. Be sure to review
your settings and Set up a backup phone numbers
and Get backup codes.
• You’re done! Next time you sign in, you’ll receive an
SMS with a verification code
Pang Chamreth, IT
Development Innovations
14
Common Techniques for Protecting
Emails
• The three common techniques adopted by most
internet users for protecting themselves are:
1. Logging out of accounts when they’re done, and not just
close your
2. Confirm it is a secure session or website (such as https://)
for “security”
3. Changing password periodically
Pang Chamreth, IT
Development Innovations
15
Best practices of password management
Why best practices of password management are
required?
Recently, most of people have their own password at
least three so they are difficult to remember all of it
because of they don’t know how to manage their
password properly. You will see the common password
that the hacker can easily to guess.
Pang Chamreth, IT
Development Innovations
16
Most Common Passwords
• Most people choose passwords that can too easily be
guessed. If your password can easily be guessed, or
it can easily be reset, you are at risk of identity theft.
Pang Chamreth, IT
Development Innovations
17
Most Common Passwords
Pang Chamreth, IT
Development Innovations
18
Password recommendations
• A good password are:
–
–
–
–
–
–
Private
Secret
Easily Remembered
At least 8 characters, complex
Not guessable
Changed regularly
• Beware that someone may see you typing it. If you
accidentally type your password instead of your login
name, it may appear in system log files
• Use 3rd party tools to encrypt password
Pang Chamreth, IT
Development Innovations
19
Sample how to put password
Combine 2 unrelated words
Mail + phone = m@!lf0n3
Abbreviate a phrase
My favorite color is blue=
Mfciblue
Music lyric
Happy birthday to you,
happy birthday to you,
happy birthday dear John,
happy birthday to you.
hb2uhb2uhbdJhb2u
Pang Chamreth, IT
Development Innovations
20
How are passwords stolen?
• Cracked
Brutef orce
Dictionary- based
Decryption
• Theft
Key loggers
Screen captures
Social engineering
Pang Chamreth, IT
Development Innovations
21
Securing your password
•
•
•
•
•
Do not share your password with others
Avoid recording your passwords in an insecure manner
Avoid saving passwords in Web browsers and other applications
Always delete e-mails that contain a password
Use a Web site’s logout feature rather than just closing your
browser
• Be smart with secret questions and answers
• Create strong passwords with a combination of number, special
symbols, and letters that cannot be guessed
• Always change passwords Once every three months is
recommended
Pang Chamreth, IT
Development Innovations
22
Password management
• Today you need to remember many passwords. You
need a password for:
-
Windows network logon,
Servers and Routers
E-mail account, Social account
your website's FTP password,
online passwords (like website member account), etc.
• Password Management(LastPass – KeePass)
Pang Chamreth, IT
Development Innovations
23
What is KeePass?
• Free open source for password manager
• No need remember many passwords
• Can bring along with you any where
Pang Chamreth, IT
Development Innovations
24
Q&A
***Security is everyone’s responsibility!
Pang Chamreth, IT
Development Innovations
25