Video

Slides

Quiz

Cheat Sheet

Glossary of Terms

References and Resources

Video

Video

Slides

Quiz

Cheat Sheet

Glossary of Terms

References and Resources

Identifying Yourself

  • /

    Identifying yourself

    Sometimes you want to identify yourself as the unique person that you are. You can convince others of who you are with a unique item, such as a card or a key, by a unique biological feature such as a fingerprint or by knowing a secret.

  • /

    Authentication

    Passwords help to prove your identity online. Good passwords make it possible to uniquely prove who you are, without someone else being able to pretend to be you. They are unique, random, long and secret but still memorable.

  • /

    Mnemonic Passwords

    Phrases can be easier to remember than complex passwords. Take advantage of this by using a phrase to remember a password.

  • /

    The Diceware Method

    The Diceware method can create a password that is random, unique, long, and memorable by using dice rolls to choose words from a list to make a password.

  • /

    Password Managers

    Password managers are programs that remember passwords for you.

  • /

    Identifying Yourself

    Sometimes you want to identify yourself as the unique person that you are. You can convince others of who you are with a unique item, such as a smart card or a mobile phone, by a unique biological feature such as a fingerprint or by knowing a password

  • Identifying yourself

    Let’s see what you have learnt about identifying yourself.

    Test your knowledge and earn your badge to share

    START THE QUIZ

  • 1
    /
    2

    Two-factor authentication is:

    A combination of two different ways of identifying yourself

    A password sent to your phone

    A smart card

    A talent show on cable television

    next question

  • 1
    /
    2

    Criminals can get passwords by:

    Tricking you into revealing them, or into installing spyware 


    Cracking passwords using a software program that makes many guesses

    Capturing usernames and passwords from one service, and attempting to use them on other services

    All of the above

    next question

  • 1
    /
    2

    A good password:

    Contains a secret that no one knows about you

    Has two numbers at the end, like “fido54”

    Contains foreign words (because a criminal can only guess in English)

    Is complex, random, long, memorable and usable

    next question

  • 1
    /
    2

    Mnemonics is a method to help create a strong password that is memorable.

    True

    False

    next question

  • 1
    /
    2

    The Diceware method of password creation:

    Is a program that creates passwords

    Uses dice to make passwords made of numbers

    Uses dice rolls and a word list to create random phrases

    Is a way of gambling with your account details

    next question

  • 1
    /
    2

    Password managers are programs that help you to manage passwords.

    True

    False

    next question

  • Identifying yourself

    your results

    /
    100

    Congratulations, you earned your badge!

    Share on Facebook

    Show the answers

    Hide the answers

    You are on the right track. Some points need to be clarified. Please review the module and try again.

    Restart the quiz

1-

Two-factor authentication is:

A combination of two different ways of identifying yourself

A password sent to your phone

A smart card

A talent show on cable television

Two-factor Authentication (2FA) tries to overcome weaknesses of just one way of identifying yourself by requiring two components that operate independently and avoid a common point of compromise. This could be something physical that you have (A specific phone) and something that you know (A password).

2-

Criminals can get passwords by:

Tricking you into revealing them, or into installing spyware 


Cracking passwords using a software program that makes many guesses

Capturing usernames and passwords from one service, and attempting to use them on other services

All of the above

There are many ways that a criminal might get your password including gathering enough information about you to guess your password; tricking you into revealing your usernames and/or password; capturing your passwords directly, e.g., by looking over your shoulder or with spyware; cracking passwords using a software program that makes many guesses; and capturing usernames and passwords from a service provider, so they can attempt access at another service

3-

A good password:

Contains a secret that no one knows about you

Has two numbers at the end, like “fido54”

Contains foreign words (because a criminal can only guess in English)

Is complex, random, long, memorable and usable

A password that uses many types of letters and characters, does not already exist, will not be created by someone else and is long is the best password provided that it is able to be remembered and can be typed in reliably.

4-

Mnemonics is a method to help create a strong password that is memorable.

True

False

Mnemonics is a method to help create a strong password that is memorable. You can use this to your advantage by systematically abbreviating a memorable phrase to create a password.

5-

The Diceware method of password creation:

Is a program that creates passwords

Uses dice to make passwords made of numbers

Uses dice rolls and a word list to create random phrases

Is a way of gambling with your account details

The Diceware method uses dice and a list of words to come up with a truly random collection of words to make a passphrase. The randomness of the phrase makes it hard to guess as it defies standard syntax and grammar rules.

6-

Password managers are programs that help you to manage passwords.

True

False

Password managers are programs that manage your passwords for you. They do this by using one password to gain access to all of your passwords or by using an easy-to-remember password to unlock a stronger password.

Cheat Sheet

Authentication (Who am I?)

Passwords help to prove your identity online. Good passwords make it possible to uniquely prove who you are, without someone else being able to pretend to be you. They are unique, random, long and secret but still memorable.

 

DO consider two-factor authentication.

DO make conscious decisions about security when choosing passwords.

Mnemonic Passwords

Phrases can be easier to remember that complex passwords. Take advantage of this by using a phrase to remember a password.

 

DO use mnemonics to make passwords that are both memorable and strong.

The Diceware method

The Diceware method can create a password that is random unique, long and memorable by using dice rolls to choose words from a list to make a password.

 

DO use the Diceware method to create passwords that are long and memorable.

Password Managers

Password managers are programs that remember passwords for you.

 

DO consider password managers if you access many accounts frequently.

Glossary of Terms

Diceware method

A method of creating long random passphrases using dice and a word list.

Encryption

A process of converting information to a form unreadable to untrusted parties that still contains the original information and is able to be read by the intended recipient.

Mnemonic

A system or pattern of ideas or associations which assists in remembering something.

Passphrase

A phrase used to identify a person as it is only known to them.

Password

A word used to identify a person as it is only known to them.

Password manager

An application that assists in managing passwords.

Phishing

A fraudulent practice or pretending to be from a reputable company in order to induce people to give their personal information (a contraction of Phone fishing).

PIN

A Personal Identification Number, a secret code used to identify a person, usually for a bank transaction.

Smart card

A card with an integrated computer chip in it.

SMS code

A code is sent to your mobile device as a text message (SMS – Short Message Service) as part of an identification process.

Two-factor authentication

A system for identifying a person that uses two components that operate independently and avoid a common point of compromise.

Username

A unique name given to a computer system or service user. Used together with a password it can identify an individual.