It is important to make a good password Stops others from stealing your information Stops others from stealing your identity Stops others from getting you in trouble What is Identity Theft ID: 689203
Download Presentation The PPT/PDF document "Passwords and Email Passwords" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Passwords and EmailSlide2
PasswordsSlide3
It is important to make a
good password
Stops others from stealing your information
Stops others from stealing your identity
Stops others from getting you in troubleSlide4
What is Identity Theft?
It is when someone impersonates another person
Physical identity theft is a minor problem
Electronic identity theft is a major problemSlide5
What identifies you
E
lectronically?
Identification numbers (social security number, student id, ...)
Usernames or account names
Passwords or pin
numbersSlide6
Where could identity theft occur
Anywhere you have personal information
Accounts (School, FAFSA, Bank, Amazon, etc.)
Emailin
g
personal informationSlide7
You should NEVER…
Give your password to
anyone
A friend or family
An
IT
person
An anonymous email
Be careful when unexpected requests for passwords appear Slide8
Also, be careful about social engineering
People just flat out asking you to sign in so they can "test" the system
People using personal information to "guess" your password
Someone watching over your shoulder to see what you type
Do
NOT
write down your information
and tape it to your keyboard, desk drawer, etc.Slide9
What doesn't make a good password?
The default password, whatever it is
Your name, your boy/girl friend's name
ANY word in English
ANY word in ANY language
Non words that have cultural meaning (R2D2, C3PO)
A word spelled backwards, in any language
A word with a number tacked onto the end
Standard number for letter replacements 3=E, 0=O
Short passwordsSlide10
https://password.kaspersky.com/Slide11
What makes a good password?
http://www.hughcalc.org/pwgen.cgi
http://preshing.com/20110811/xkcd-password-generator/
Random – upper and lower case letters, numbers, symbols
Length – the greater the better (minimum 8)
Fresh – try not to repeat characters
Unique – different passwords for different systems
Secret – never share with anyone
Memorable – passphrases you can remember
Slide12
Some Rules:
Keep your password to yourself
You should never have to give your password to a person
Keep a secure password
Keep separate passwords for
different systems
Always be careful with your passwordSlide13
Why these rules for passwords?
Identity Theft has become a major problem
In most systems, your account name or number along with your password are your identity on that system
Most account names are public information Slide14
Changing your PasswordSlide15
Changing your Password
Open a web browser
Connect
to Edinboro University Home page:
http://www.edinboro.edu
Select: “
MyEdinboro
”
Select:
Forgot / Expired / Change PasswordSlide16
EUP Student EmailSlide17
Connect to Email
Login to
MyEdinboro
Select icon for student emailSlide18
Communicating through Email
Most official correspondences are handled through your campus email account
It is one form of information release (alerts can be sent to email)
Most official announcements are handled through email
Distribution lists are established for classes, majors, departments, etc. Slide19
Email Etiquette
First and foremost THINK about what you are sending
Would you put it on paper?
Someone might print it out
Would you want it to last forever?
Most systems are backed up, and most people are capable of saving email messages
Would you want it used in court?
System records are subject to subpoena
Would you want it published?
Some records are subject to the sunshine laws Slide20
Email Etiquette
Don't "e-mail angry"
Be careful with confidential information
Keep it clean
Organize your message - you don't want to read something that is a mess
Content – be clear in your message
Be clear in your subject line
You want the recipient to read it
People receive tens to hundreds of email messages a day
You don't want it caught in a spam filterSlide21
Email Etiquette
Beware of the "reply all"
Briefly introduce yourself
Your e-mail is a reflection of you
Be concise and to the point
Answer all questions and preempt further questions
Use proper spelling, grammar & punctuation
Pay attention to the TO and CC fieldsSlide22
Parts of an Email Message
TO:
email address(
es
) of primary persons
CC: (carbon copy)
email address(
es
) of other people who may be involved/interested in the contents of the message (Think FYI)
BCC: (blind carbon copy)
email address(
es
) of other people who will receive a copy, but the fact that they have received a copy is concealed from other recipient(s)
Use this when sending an email to a group of people where you don't want to share membership/emails with the group
Use it when you don't want the person bcc'd to be forced to acknowledge that they received a copy
It also stops "reply all"
Subject:
short summary of contents
Body:
messageSlide23
Email Attachments
A file sent along with an email message
File format is maintained
Size is usually limited
In most email clients:
Find the attach button
Select the file you want to attach
Be careful of attachments
Don't open attachments from people you don't know/trust
Zip or self-extracting zip files (.zip or .exe) Slide24
Final Tips
Be careful when you don’t recognize the sender
Notice the actual email address
Don’t respond to threats – “send us your password and email before you lose all your contacts”
Notice phishing emails - poor grammar or misspelled words can be an indicator
Keep passwords private and update them every 90 days