swipe left
โ€˜s
โ€˜s
Passwords
aliens show
how hackers
aliens show
how hackers
steal
steal
breaks in by force, just like a brute force
attack that tries every possible password
until one works.
breaks in by force, just like a brute force
attack that tries every possible password
until one works.
Use long, complex passwords
with a mix of characters and
set up account lockout after
failed attempts.
Four Arms
Tips
Tips
swipe left
uses brains over brawn, just like a dictionary
attack that guesses your password using
common words.
uses brains over brawn, just like a dictionary
attack that guesses your password using
common words.
Donโ€›t use real words or names.
Go for unpredictable, random
combos instead!
Grey Matter
Tips
Tips
swipe left
sneaks up unseen, like phishing emails that
trick you into revealing your passwords.
sneaks up unseen, like phishing emails that
trick you into revealing your passwords.
Never click suspicious links,
always verify sender emails,
and turn on 2FA.
Tips
Tips
swipe left
Ghostfreak
merges with machines, just like keyloggers
that secretly track what you type.
merges with machines, just like keyloggers
that secretly track what you type.
Use trusted devices, install
antivirus software, and keep
everything updated.
Tips
Tips
swipe left
Upgrade
fires rapidly, like password spraying, where
hackers try common passwords on many
accounts at once.
fires rapidly, like password spraying, where
hackers try common passwords on many
accounts at once.
Use strong passwords and avoid
setting obvious ones like
"123456" or "password."
Tips
Tips
swipe left
Heatblast
sneaks in and spreads, like malware that
gets planted to steal or expose your
passwords.
sneaks in and spreads, like malware that
gets planted to steal or expose your
passwords.
Avoid downloading unknown
attachments or software. Keep
systems updated.
Tips
Tips
swipe left
Stinkfly
tricks with sound, just like vishing calls
pretending to be banks or officials to steal
passwords.
tricks with sound, just like vishing calls
pretending to be banks or officials to steal
passwords.
Never share OTPs or login
info over calls. Verify the
caller independently before
trusting them.
Tips
Tips
swipe left
Echo Echo
Ben uses the right alien
for the right enemy.
Ben uses the right alien
for the right enemy.
Use the right strategy to defeat password
attackers and keep your accounts safe.
Use the right strategy to defeat password
attackers and keep your accounts safe.

More Related Content

PDF
wepik-dont-get-caught-in-the-cyber-trap-outsmarting-scammers-101-202407220328...
PDF
Password Attack and its Types-1.pdf
PDF
Password Attack and its Types- InfosecTrain.pdf
PDF
Exploring Password Attacks: Understanding Different Types.pdf
PPTX
S01.L06 - Internet Security
PDF
Cybersecurity Awareness Infographics
PPT
5 tips for an unbreakable password
PPTX
S_A_T.pptx
wepik-dont-get-caught-in-the-cyber-trap-outsmarting-scammers-101-202407220328...
Password Attack and its Types-1.pdf
Password Attack and its Types- InfosecTrain.pdf
Exploring Password Attacks: Understanding Different Types.pdf
S01.L06 - Internet Security
Cybersecurity Awareness Infographics
5 tips for an unbreakable password
S_A_T.pptx

Similar to World password Day Ben 10 Security Day By InfosecTrain (20)

PPTX
Security-Awareness-Training.pptx
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PPTX
Honeywords - BSides London 2014
PDF
How to choose a password thatโ€™s hard to crack
PDF
Password management for you
PDF
The Significance of Cybersecurity and securing your system
PPTX
Lesson Presentation Powerful Passwords.pptx
PPT
Overview of information security
PPT
Internet Security
PDF
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
PDF
Why is password protection a fallacy a point of view
PPTX
Password management
PDF
How passwords are costly
PPTX
Network Security
PDF
AI-Related Cyber Risks
PDF
Why is password protection a fallacy a point of view
PPTX
Ethical hacking for Business or Management.pptx
PDF
10.a guide-to-facebook-security
PPTX
Strong Passwords
PDF
How to protect yourself from online account takeovers
Security-Awareness-Training.pptx
How to Protect Yourself From Heartbleed Security Flaw
Honeywords - BSides London 2014
How to choose a password thatโ€™s hard to crack
Password management for you
The Significance of Cybersecurity and securing your system
Lesson Presentation Powerful Passwords.pptx
Overview of information security
Internet Security
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
Why is password protection a fallacy a point of view
Password management
How passwords are costly
Network Security
AI-Related Cyber Risks
Why is password protection a fallacy a point of view
Ethical hacking for Business or Management.pptx
10.a guide-to-facebook-security
Strong Passwords
How to protect yourself from online account takeovers
Ad

More from priyanshamadhwal2 (20)

PDF
Top 20 plus Networking Commands for Network Professionals
PDF
Case study Empowering a fintech organization with ISO IEC 27001 2022
PDF
CEH Module 5 Vulnerability Analysis Mind map by Infosectrain
PDF
SEBI Securities and Exchange Board Of India CSCRF Controls
PDF
InfosecTrain Mind map CEH Module 3 Scanning Networks
PDF
CRISC 100 Days study plan By InfosecTrain.pdf
PDF
Red Team Expert Interview questions and answers
PDF
Vulnerability Scanning with Nessus A Practical Guide
PDF
Tips to Secure Your Cloud Infranstructure
PDF
CISA Domain Wise Summary By InfosecTrain
PDF
How Cyberterrorism Can Cripple a nation By InfosecTrain
PDF
Dev plus Security The most wanted Tech skill in 2025.pdf
PDF
Black Window Stealth Mastering Ethical Hacking Techniques
PDF
World Wide Web Day From Connection to Transformation
PDF
OSI Model Vs TCP IP Know the layers, master the network By Infosectrain
PDF
Top 10 Network Security Solutions by Infosectrain
PDF
Digital Forensic Investigator Top Interview Questions and answers
PDF
Advance Cloud Security Governance Training By InfosecTrain.pdf
PDF
Crowdstrike Day Carousel By InfosecTrain
PDF
Internal Audit Interview Questions and Answers
Top 20 plus Networking Commands for Network Professionals
Case study Empowering a fintech organization with ISO IEC 27001 2022
CEH Module 5 Vulnerability Analysis Mind map by Infosectrain
SEBI Securities and Exchange Board Of India CSCRF Controls
InfosecTrain Mind map CEH Module 3 Scanning Networks
CRISC 100 Days study plan By InfosecTrain.pdf
Red Team Expert Interview questions and answers
Vulnerability Scanning with Nessus A Practical Guide
Tips to Secure Your Cloud Infranstructure
CISA Domain Wise Summary By InfosecTrain
How Cyberterrorism Can Cripple a nation By InfosecTrain
Dev plus Security The most wanted Tech skill in 2025.pdf
Black Window Stealth Mastering Ethical Hacking Techniques
World Wide Web Day From Connection to Transformation
OSI Model Vs TCP IP Know the layers, master the network By Infosectrain
Top 10 Network Security Solutions by Infosectrain
Digital Forensic Investigator Top Interview Questions and answers
Advance Cloud Security Governance Training By InfosecTrain.pdf
Crowdstrike Day Carousel By InfosecTrain
Internal Audit Interview Questions and Answers
Ad

Recently uploaded (20)

PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Farming Based Livelihood Systems English Notes
PDF
anganwadi services for the b.sc nursing and GNM
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Chevening Scholarship Application and Interview Preparation Guide
PPTX
Macbeth play - analysis .pptx english lit
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
Reproductive system-Human anatomy and physiology
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Compact First Student's Book Cambridge Official
PDF
Physical education and sports and CWSN notes
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
Everyday Spelling and Grammar by Kathi Wyldeck
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
faiz-khans about Radiotherapy Physics-02.pdf
Disorder of Endocrine system (1).pdfyyhyyyy
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Farming Based Livelihood Systems English Notes
anganwadi services for the b.sc nursing and GNM
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Chevening Scholarship Application and Interview Preparation Guide
Macbeth play - analysis .pptx english lit
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Nurlina - Urban Planner Portfolio (english ver)
Reproductive system-Human anatomy and physiology
Journal of Dental Science - UDMY (2022).pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Compact First Student's Book Cambridge Official
Physical education and sports and CWSN notes
The TKT Course. Modules 1, 2, 3.for self study
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Diabetes Mellitus , types , clinical picture, investigation and managment

World password Day Ben 10 Security Day By InfosecTrain

  • 1. swipe left โ€˜s โ€˜s Passwords aliens show how hackers aliens show how hackers steal steal
  • 2. breaks in by force, just like a brute force attack that tries every possible password until one works. breaks in by force, just like a brute force attack that tries every possible password until one works. Use long, complex passwords with a mix of characters and set up account lockout after failed attempts. Four Arms Tips Tips swipe left
  • 3. uses brains over brawn, just like a dictionary attack that guesses your password using common words. uses brains over brawn, just like a dictionary attack that guesses your password using common words. Donโ€›t use real words or names. Go for unpredictable, random combos instead! Grey Matter Tips Tips swipe left
  • 4. sneaks up unseen, like phishing emails that trick you into revealing your passwords. sneaks up unseen, like phishing emails that trick you into revealing your passwords. Never click suspicious links, always verify sender emails, and turn on 2FA. Tips Tips swipe left Ghostfreak
  • 5. merges with machines, just like keyloggers that secretly track what you type. merges with machines, just like keyloggers that secretly track what you type. Use trusted devices, install antivirus software, and keep everything updated. Tips Tips swipe left Upgrade
  • 6. fires rapidly, like password spraying, where hackers try common passwords on many accounts at once. fires rapidly, like password spraying, where hackers try common passwords on many accounts at once. Use strong passwords and avoid setting obvious ones like "123456" or "password." Tips Tips swipe left Heatblast
  • 7. sneaks in and spreads, like malware that gets planted to steal or expose your passwords. sneaks in and spreads, like malware that gets planted to steal or expose your passwords. Avoid downloading unknown attachments or software. Keep systems updated. Tips Tips swipe left Stinkfly
  • 8. tricks with sound, just like vishing calls pretending to be banks or officials to steal passwords. tricks with sound, just like vishing calls pretending to be banks or officials to steal passwords. Never share OTPs or login info over calls. Verify the caller independently before trusting them. Tips Tips swipe left Echo Echo
  • 9. Ben uses the right alien for the right enemy. Ben uses the right alien for the right enemy. Use the right strategy to defeat password attackers and keep your accounts safe. Use the right strategy to defeat password attackers and keep your accounts safe.