The Simplest Security A Guide to better Password Practices – DSO

advertisement
The Simplest Security
A Guide to better Password
Practices
Provided By: Utah Education Network – DSO
Terms of Use

Use of this presentation is granted to education and nonprofit entities for education in security topics as described
herein. The following limitations and restrictions apply:
•
•
•
•
The content of this presentation remain unchanged from its
original published format, except for updates to the content
for accuracy or current tactics/trends
Any changes made to the presentation are understood to
not be the original work of the author, and noted in the
presentation as such.
Credit to the author is retained as-is in the original
presentation format.
Use by “for profit” or “commercial” entities must be granted
permission by the author, and are subject to further
restrictions.
A Refresher – Password Usage

Passwords are Annoying
• Need passwords for everything
• Difficult to come up with one we can
•
•
remember
Procrastinate changing them
Oh the PAIN !
A Refresher – Password Usage

Passwords are often the First and ONLY
defense against intrusion
• They protect Personal and Company
information


Passwords are simple and cheap
Define “Password”
Password Cracking




Cracking is the process of figuring out or
breaking passwords in order to gain
unauthorized access.
Most Passwords can be cracked easily
• Its Much easier than you think
Dictionary Cracking
Brute Force Cracking
Password Cracking


Literally Hundreds of tools to crack
passwords
Social Engineering of Passwords
• The “Post-it™” Note
• “Under the Keyboard”
• Over the Phone
• What ABOUT You?
Passwords Cracking

Other technological ways of getting
passwords
• Cleartext vs. Encrypted Passwords
• Network Sniffers

It is Possible and even Likely that
someone knows at least one of your
passwords right now.
Choosing Good Passwords
What NOT to use

The Don'ts
• No Dictionary words
• nimda (Backwards ‘admin’)
• Difficult to figure out but NO Match for Crackers or
Brute Force Guessers.
• No Proper Nouns
• No Foreign Words
• Foreign Dictionaries Exist too.
Even Japanese 
Choosing Good Passwords
No Personal Information

It is easy for hackers to social engineer
personal information about you.
• The Dumpster Dive for personal info.

Don’t include personal information in
your passwords.
• Birthdates, Anniversary, Phone Numbers
• Pet Names, Nicknames, Name of Family
Members
Choosing Good Passwords
Length, Width and Depth

Length
• Probability dictates that the longer the
•
password is, the more difficult it will be to
crack. Simply put, Longer is Better.
Recommendations:
• Between 6 to 8 Characters in Length
• Greater length is better if the OS can support it.
• Shorter passwords should be avoided
Choosing Good Passwords
Length, Width and Depth

Width
• Width is the variation of characters used in a
password.
• Don’t just consider the Alphabet.
There are also
Numbers and Special Characters.
• Case Sensitive Passwords, ALT Characters,
Spaces should also be considered.
Choosing Good Passwords
Length, Width and Depth

Width
• As a General Rule the following character
sets should all included in every password
• Uppercase letters such as A, B, C
• Lowercase letters such as a, b, c
• Numerals such as 1, 2, 3
• Special Characters such as %, $, #, !, *
• ALT Characters such as Є, ψ, Ω, β
• May not be supported by some OS’s
Choosing Good Passwords
Length, Width and Depth

Depth
• Depth refers to choosing a password with a
challenging meaning.
• A Good Password is easy to remember but Hard to
guess
• Stop thinking in terms of PassWORDS, and start
thinking in terms of Phrases.
• Mnemonic Phrases allow the creation of complex
passwords without the need to write them down.
Choosing Good Passwords
Length, Width and Depth

Depth
• Examples of Mnemonic phrases include a
phrase spelled phonetically:
• Such as: ‘ImuKat!’ (instead of ‘I’m a cat!’)
• Or: ‘qbfjold*’ (quick brown fox jumped over the lazy dog)
• You may want to choose a phrase of
personal meaning (Not Personal Info)
• Substitution of Characters are useful like
using “3” for the letter “E”
• Such as: M@gaZyn3 (Magazine)
Extra Protection


All of the good Password Crackers
include Foreign words, backwards
words, etc.
But the easiest way to get a Password is
to steal it!
• Its easier to never give it away
Extra Protection


In some cases, a Good password is enough to
keep intruders out.
In other cases, its just a start. The use of
further protection is necessary.
•
•
Encryption
• Means Garbling the password to protect from sniffers or
other onlookers.
One Time Passwords
• Means just what it says.
good once.
Using a password that is only
Extra Protection

Users should avoid the use of the same
password on multiple systems.
•

Doing this creates a single point of failure.
Users should not share passwords with
Anyone.
•
•
•
If someone else needs access, they should get their
own account to the system.
System Admins should Never ask you for your
password.
NEVER Share a password to anyone over the phone.
Not even with a “System Administrator”
Extra Protection

Exercise extreme caution when writing
down or storing passwords.
• Dumpster Diving, Shoulder Surfing.

Choose passwords that are easy to
remember so that they don’t need to be
written down.
Changing and Storing
Passwords

To ensure effectiveness, passwords should be
changed on a regular basis.
•
•
•
•
Changing Passwords is Generally Simple. Ask your
systems admin if you need help.
Change Passwords as CLOSE to the Account as
possible
Don’t let anyone watch while you type in your
password
If possible, the password should be changed over a
secure connection like a Secure Shell (SSH)
Changing and Storing
Passwords

How often do you change passwords (General
Rule)
•
•
•

Financial or SIS Accounts – 1-2 Months
Network Passwords – 2-3 Months
Just use Good Judgment “Don’t Be Lazy”
• All Passwords should Never be over 4 Months old.
Changing a password is relatively quick and
painless compared to the irritating and
expensive process of Hacked Systems
Recovery, or Identity Theft.
Tips for Organizations
And Network Admins

Strong Password Policies
•
•
•
Require the Best Practices in Password Management
Educate users on how easy it is for someone to get
their password.
• Social Engineering
• Online Attacks, etc.
• New Users should be taught Good password practices
The Password Policy should be integrated into the
overall Security policy of the organization.
Tips for Organizations
And Network Admins






Implement safeguards to ensure systems are
using Strong Passwords. (PAM)
Set Password Expiration Dates according to
account type and access to services.
Keep Password history to prevent reuse, Lock
accounts with 3-5 Bad attempts
Fewer people with access is better
Remove accounts for people who have left.
ALWAYS Change the default passwords to
systems you install.
References














The Simplest Security: A Guide To Better Password Practices
by Sarah Granger
http://www.securityfocus.com/infocus/1537
Compiled and Updated by Troy Jessup
Utah Education Network – Departmental Security Office
http://www.uen.org/security
Armstrong, Del and Simonson, John: “Password Guessing” and “Password Sniffing,” An Intro to Computer Security, School of
Engineering & Applied Sciences, University of Rochester, Oct. 25, 1996.
http://www.seas.rochester.edu:8080/CNG/docs/Security/security.html
Belgers, Walter: “UNIX Password Security,” JANET-CERT, Dec. 6, 1993.
http://www.ja.net/CERT/Belgers/UNIX-password-security.html
Cliff, A.: “Password Crackers - Ensuring the Security of Your Password”, Security Focus, Feb. 19, 2001.
http://www.securityfocus.com/infocus/1192
Cons, Lionel: CERN Security Handbook (Practical computer security for CERN users), Version 1.2, 12 December 1996.
http://consult.cern.ch/writeups/security/security_3.html#SEC7
Donovan, Craig: “Strong Passwords,” SANS Institute, June 2, 2000. http://www.sans.org/infosecFAQ/policy/password.htm
Garfinkel, Simson and Spafford, Gene: Practical UNIX Security, O’Reilly & Associates, Inc. Sebastopol, CA, 1991 & 1996.
MacGregor, Tina: “Password Auditing and Password Filtering to Improve Network Security”, SANS Institute, May 13, 2001.
http://rr.sans.org/authentic/improve.php
“Password Security: A Guide for Students, Faculty, and Staff of the University of Michigan,” University of Michigan, Information
Technology Division, Reference R1192, Revised April 1997.
http://www.umich.edu/~policies/pw-security.html
Russell, Deborah and Gangemi Sr., G.T.: Computer Security Basics, O’Reilly & Associates, Inc. Sebastopol, CA, 1991.
Thomas, Stephen: “Popular Myths on Password Authentication,” 2600, Summer 2001
http://www.2600.com
Visser, Joe: “On NT Password Security,” Open Solution Providers, 1997.
http://www.osp.nl/infobase/ntpass.html
PLEASE DO NOT REMOVE THESE REFERENCES FROM THE PRESENTATION
Download