Szukaj
  • Szukaj
  • Moje Scenorysy

Cybersecurity

Utwórz Storyboard
Skopiuj tę scenorys
Cybersecurity
Storyboard That

Stwórz własną Storyboard

Wypróbuj za darmo!

Stwórz własną Storyboard

Wypróbuj za darmo!

Tekst Storyboardowy

  • Protect your dataPrevent Cybercrime Now
  • Set a strong password
  • Is John123! a strong password
  • Passwords are widely used in IT, telephony, in the banking world. The simplest form is the 4- or 6-digits numeric code (PIN).
  • NO
  • What are the risks?
  • Another danger of passwords is their reuse for several sites.
  • Unfortunately, technological advancements have made brute-force password research tools extremely effective.
  • Socialengineering encourages users to log on to a site imitating the one they think they are dealing with, thus allowing their credentials (email address and password) to be stolen.
  • Therefore, it is necessary to consider all the possibilities offered by the provider of the messaging service to protect this address and this connection.
  • Source of Risk: Multiple
  • Before the end of the day, Remy is going to be imprudent.Confidential documents will be stolen.
  • Like every morning, Joseph types his identity and his password JOSEPH123
  • Do you think this password is sufficiently complex?
  • The password is a secret known to both the service and the user, which allows the service to"prove" that the given identity is genuine.
  • Protect your dataPrevent Cybercrime Now
  • ·
  • A password is asecret associated with an identity. It allows you to associate two elements,what you have (a bank card, a badge, a phone, a fingerprint) and what you know(password or code).
  • A password should generally be kept hidden to preserve secrecy during this type of incident
  • A hacker can relatively quickly discover passwords from fingerprints if he obtains them.
  • Many services (social networks, commerce,banking) require the identification and authentication of their users.
  • These mechanisms can be sending codes by SMS to a mobile phone, an emergency email account,pre-printed single-use codes, etc. These channels allow you to control access to your email account by being alerted to compromise attempts and recover this access in the event of loss of the password.
  • · The frequent change of passwords is often an obligation of the professional world.
  • JOSEPH123 is too simple as a password, it can be easily discovered!
  • Information security at workEveryone is responsible for ensuring the protection of their data.
  • How do you judge this password?
  • If you say yes, Here is how to create a strong password
  • The main risk is theft of the password, which allows the associated identity to be stolen.
  • Today, the main risk is linked to the fact that an email address is associated with passwords. This universal identifier is therefore extremely sensitive; it is, therefore, a natural target for attackers.
  • A hacker can also capture passwords, for example, by trapping the user
  • Ensuring that you are addressing the right site and that the connection is encrypted(padlock, green color in the browser bar) is necessary to prevent these passwords from being compromised.
  • · How to protect yourself?
  • Use a password generator
  • · This is often seen as a constraint, amplified by others such as the length, the variety of characters used, the lack of reuse of old passwords, etc.
  •  Vary the characters
  • Experience shows that too many constraints lead users to choose less secure passwords.
  • Randomly generated and stored in a digital safe) and to take special care in securing sensitive services, such as the email address
  • Use the protection mechanisms provided by these services, such as double authentication by SMS or recovery codes, and being vigilant in an anomaly).
  • Remember passwords without writing them down.
Utworzono ponad 30 milionów scenorysów