The "No Network is 100% Secure" series
- Passwords -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
What is a password?: A password is a secret word or string of characters that
is used for authentication, to prove identity or gain access to a resource such as
logging on to a computer. Your password is the key you use to access personal
information that you've stored on your computer and in your online accounts.
Why are strong passwords important?: If criminals or other malicious users steal your personal information, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. In many cases you would not notice these attacks until it was too late. In the case of your company username and password, if hackers are able to break into your account, they can use your employee access to attempt additional break-ins to your corporate network.
Fortunately, it is not difficult to create strong passwords that you can actually remember and keep them well protected.
What makes a strong password: The best passwords are those that are difficult to guess but easy to remember.
Lengthy passwords: Each character that's added to a password increases the protection by orders of magnitude. Passwords should be at least 8 characters in length. Many systems also support use of the space bar in passwords, so you can create a phrase made of many words which is known as a "pass phrase". A pass phrase is often easier to remember than a simple password, as well as being longer and thus harder to guess.
Character variety: The greater the variety of characters in your password, the harder it is to guess. Use numbers, punctuation and uppercase numerals to add variety in your passwords. But it's very important to create passwords that you can remember. A strong password that you can't remember is fairly useless and your IT guys will quickly tire of resetting your password for you. An example of a good password would be something like: 0-Happy:)Face-0 ... fairly easy to remember, rather difficult to guess.
Remembering your password: Contrary to popular opinion, there is nothing wrong with writing passwords down, but they need to be adequately protected in order to remain secure and effective. Taping your password to the bottom of your keyboard or putting it on a piece of paper that's in your top middle desk drawer does not satisfy that requirement! However, in general, passwords written on a piece of paper are obviously more difficult to compromise from the Internet than a password manager, Web site, or other software-based storage tool, such as password managers.
I use a private key/public key system to manage my passwords. The public key would look something like:
Hotmail - 1
Yahoo - 2
Voicemail - 3
ATM - 4
My public key would be in my wallet, briefcase or the notebook I carry around.
The private key would be my actual passwords and would obviously be stored securely and not anywhere near my public key. The private key would look like:
1 - 2009Foobar$$$
2 - DallasC0wb0yz
3 - Un1cycles4fun
4 - 04July1776!**
I keep each password on a separate card that is well hidden but easy recover if needed. If you are particularly clever, you can also implement some sort of version control into this scheme as well. Someone finding just one key would not really be able to do much with it. And to be honest, I am less worried about someone finding my private key and figuring out what it means than I am about an Internet hacker cracking a weak password.
Testing your password: There are tools and web sites that will test your password for strength. But only do this on a trusted web site! If you're really paranoid, you can cloak your IP address by visiting the site through a proxy server. And of course any legit site is not going to ask for any personal information.
Really bad passwords: There are common methods used to create passwords are easy to guess by criminals. To avoid weak, easy-to-guess passwords:
Avoid sequences or repeated characters. "12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not make for very secure passwords.
Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know how to crack passwords will not be fooled by common look-alike replacements, such as replacing an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd". But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password.
Avoid your login name. Or any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. This is one of the first things criminals will try.
Avoid dictionary words in any language. Criminals use sophisticated tools that can rapidly guess passwords that are based on words in multiple dictionaries, including words spelled backwards, common misspellings, and substitutions. This includes all sorts of profanity and any word you would not say in front of your children.
Use more than one password. If any one of the computers or online systems using a particular password is compromised, all of your other information protected by that password should be considered compromised as well. It is critical to use different passwords for different systems.
Avoid using online storage. If malicious users find these passwords stored online or on a networked computer, they have access to all your information.
Also, read our white paper on "Phishing" for more information about protecting your personal information.
Protecting your passwords: Obviously, do not share your password with anyone. Anyone!
Protect recorded passwords as discussed earlier.
Never provide your password over e-mail or based on an e-mail request. Not even if the request comes from God himself. Ever!
Do not type passwords on computers that you do not control. Computers such as those in Internet cafes, computer labs, shared systems, kiosk systems, airport lounges and so on should be considered unsafe for any personal use other than anonymous Internet browsing. Do not use these computers to check online e-mail, bank balances, business mail, or any other account that requires a user name and password. Criminals can and do have keystroke logging trojans infecting many of these computers. Trojans permit malicious users to harvest all the information typed on a computer from across the Internet. Remember that your passwords and pass phrases are worth as much as the information that they protect.
Changing your passwords frequently: I am not a fan of forcing users to change their passwords every few weeks, especially on systems that force users to create passwords that are impossible to remember. In my view, if a user has chosen hardened passwords and is diligent about protecting those passwords, there's no reason to change them. The fact is, if a hacker is able to crack your password, the damage will be over and done with long before the system-mandated password change edict comes along. However, that said, it's a good idea to change or at least modify your passwords periodically.
Cracked passwords: Be sure to monitor all the information you protect with your passwords, such as your monthly financial statements, credit reports, online shopping accounts, and so on. Strong passwords can help protect you but there are no guarantees. If you enter your password on a computer that's been infected with a trojan, consider it compromised. And no matter how strong your password is, if someone breaks into the system that stores it, they will have your password. If you're connected to the Internet via WiFi, there's always the risk that your data can be intercepted especially if a weak encryption method is being used.
If you notice any suspicious activity that could indicate that someone has accessed your information, notify authorities as quickly as you can. And obviously, changing passwords is imperative.
Web mail password resetting vulnerability: The Sarah Palin hacker managed to reset her password by Googling for the answer to her "secret question", followed by two similar password resetting attacks aimed at Twitter employees. This method of account hacking is amazingly easy to do. And since most people use the same password for multiple accounts (if not all of their accounts) once you have someone's Yahoo password, you can do some real damage.
So just how secret are the "secret questions" used for resetting forgotten passwords? Not so secret after all, as it turns out. In a recent study, participants were able to guess the answers to "secret questions" challenges for people they didn't even know 17% of the time. The study also confirmed that the most popular questions were in fact the easiest ones to answer. How difficult do you think it would be to find out what someone's Mother's maiden name was once you knew their name? And that doesn't even mention the ease of breaking an 8-character "secret question" answer using a brute force attack!
Brute forcing attempts against the security questions is certainly a feasible attack tactic. But these days, malicious attacks tend to be much more sophisticated and pragmatic than that. This is especially true in a Web 2.0 world where the majority of potential victims have already unconsciously/consciously published the answers to their security questions somewhere on the Web.
Security questions are not really a viable, secure form of authentication. If you use one of the many free web mail services out there, it is advisable to use a one-off, hardened password that is exclusive to that one account. Perhaps 25December0000 (Christ's birthday). Easy to remember but difficult to crack. And when creating your "secret question" challenge responses, be a little crafty. Don't enter your Mother's maiden name when asked. Use your Mother-in-law's maiden name, your Sister's married name or something like that. It's OK to lie! Still not totally secure but if you are going to have your password cracked, at least make them work for it. If you choose your password well, you'll never need to reset it anyway. Remember that you not only don't want to provide a weak password. You also don't want to provide weak "secret question" responses!
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Proxy Server White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourcing White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro