Completed Assignment

advertisement
Dear Mr. Farnsworth:
Recognizing that the individual password is one of the potentially weakest links in
computer security is a vital step in establishing and enforcing a strong password policy
for your organization.
As per your request, I evaluated the strength of the employees’ passwords by
attempting an intrusion like an average attacker would. I ran a program that was able to
efficiently and effectively process large quantities of letter and number combinations in
different languages until a match for a password is found.
The passwords that the software was able to match and guess were:
● Passwords that are the same as the person’s username
● Passwords that are the same as the person’s username spelled backward
● Passwords that are all numbers
● Passwords that were based on English and foreign dictionary words
● Passwords followed by a single number
● Passwords that have an easily predictable pattern of letters and numbers
Due to the alarming number of weak passwords that were audited, new password
policies must be strictly enforced immediately. These sets of policies are specifically
tailored for the different units of the company based on their responsibilities,
professional background, and exposure to varying levels of sensitive information. The
different factors aforementioned were carefully considered in order to try and inculcate
the idea that security should not be a tedious task - this way, users would be more
inclined or make an effort to create strong passwords.
Establishing a strong password policy that users will be able to adhere to will definitely
prevent loss, exposure, or corruption of company data, client information, or personal
information. Our goal is to make it as difficult as possible for hackers to attack the
system, since there are numerous easily accessible programs that can steal passwords
without requiring much effort, but would cost the company millions of dollars’ worth of
exploited data.
The following pages contain detailed information about the new password policies and
the list of usernames with weak passwords.
Sincerely,
Jennifer Garcia
Daytona State College
D1 Unit Password Policy
I. Overview and Purpose
There are approximately 1.5 million attempts to breach Massachusetts Institute of
Technology’s network, daily. Attacks like these are done by automated software that
uses a range of simple to sophisticated pattern matching and dictionary attack
algorithms. On average, a 6 letter password that contains small letters can be guessed
in 155 seconds. In 155 seconds, years’ worth of intellectual property could potentially be
exploited or corrupted. The risk is not worth the value and time you put into YOUR work.
Since this unit works with extremely sensitive data, it is definitely under constant and
heavy attack. Implemented hardware and software security can only go so far without
users exercising utmost caution when creating, writing down, or storing passwords.
II. Guidelines
❏ Based on password length, the rules on character combinations are as follows:
❏ 8-11 characters: mixed case letters, numbers, and symbols
❏ 12-15 characters: mixed case letters and numbers
❏ 16-19 characters: mixed case letters
❏ 20-25 characters: no restrictions
❏ Passwords that have these characteristics will be denied by the system:
❏ Passwords that are equal to your current password, previous passwords,
or username
❏ A single word that appears in an English or non-English dictionary
❏ Two dictionary words in a row
❏ Passwords that are all white space
❏ Dictionary words spelled backward
❏ Passwords with phone number patterns or all numbers
❏ Characters that are not in the US keyboard
❏ Predictable combination of letters, numbers, or characters
❏ Passwords with several repeating characters that are not combined with
other special characters or words
❏ Common names or places that are not combined with other characters or
words
❏ Passwords are subject to change every 90 days.
❏ Never share passwords with anyone and must be treated as confidential
information.
❏ Immediately notify the Information Systems Security Department of any
suspicions of your password being compromised or if your password was
actually compromised.
❏ If using a password manager, be sure to make your master password a strong
one.
III. Examples of Good Passwords
❏ ImuK@t!!1 (I am a cat spelled phonetically and substituting some characters and
see character guidelines for 8-11 characters)
❏ XxXtraCh33zePLZ (mixed case letters and numbers, misspelled word and see
character guidelines for 12-15 characters)
❏ DonutZeroCalorie (combination of words that will never make sense and see
character guidelines for 16-19 characters)
❏ veryiphonemanydollaspend (misspelled words in a phrase that are complexly
combined and see character guidelines for 20 characters)
IV. Password Protection
❏ Only write down hints that will help you jog your memory, never the actual
password
❏ If written down, keep and protect it as you would a credit card
VI. Enforcement
Random password audits must be performed by the Information Systems Security
Department. Users that have weak passwords as deemed by the audit will have their
data backed up and shall be submitted to a mock breach or hack scare that emulates
data loss or corruption. These employees will be subject to either disciplinary action or
training, depending on the frequency of using weak passwords.
Sources:
MIT: http://kb.mit.edu/confluence/display/istcontrib/Strong+Passwords
Stanford: https://itservices.stanford.edu/service/accounts/passwords
Symantec: http://www.symantec.com/connect/articles/simplest-security-guide-betterpassword-practices
Z7 Business Unit Password Policy
I. Overview and Purpose
A 6 letter password that contains all small letters has 456,976 possible combinations
and can be guessed at an average of 155 seconds by an automated software that uses
a range of simple to sophisticated pattern matching and dictionary attack algorithms. In
155 seconds or less, thousands of the company’s, charities’, or agencies’ private
information could be stolen and exploited. Just for a short period of time, not only data,
but also reputation could be compromised. The risk is not worth what could possibly be
lost. Implemented hardware and software security can only go so far without users
exercising utmost caution when creating, writing down, or storing passwords.
II. Guidelines
❏ Using a pass phrase that has 20-25 characters with no casing restrictions,
instead of a password, will be enforced. A pass phrase is composed of different
words. It is a longer but simpler version of a password.
❏ Pass phrases that have these characteristics will be denied by the system:
❏ Phrases that contain your current password, previous passwords, or
username
❏ Repeating dictionary words consecutively that appear in an English or
non-English dictionary
❏ Repeating dictionary words spelled backward consecutively
❏ Repeating the same numbers consecutively 5 times
❏ Repeating the same special character consecutively 5 times
❏ Characters that are not in the US keyboard
❏ Predictable combination of letters, numbers, or characters
❏ Phrases with several repeating characters that are not combined with
other special characters or words
❏ Common names or places that are not combined with other characters or
words
❏ Phrases that are all white space
❏ Pass phrases are subject to change every 90 days.
❏ Never share pass phrases with anyone and must be treated as confidential
information.
❏ Immediately notify the Information Systems Security Department of any
suspicions of your pass phrase being compromised or if your pass phrase was
actually compromised.
❏ If using a password manager, be sure to make your master password a strong
one.
III. Examples of Good Passwords
Combine unrelated words but have a personal meaning. Throw in some numbers,
characters, misspellings, spaces, some Klingon or foreign language, or different
character casing for the ultimate secure password.
❏ daughtererrdaymakeeatveg
❏ 1SOLUVmondayzJKHEHE!
❏ P1ZZAeveryBREAKFASTwoo+
❏ LoveMeLikeALoveSongWhatNO
❏ jIyajbe'. IT ppl why?!
IV. Password Protection
❏ Only write down hints that will help you jog your memory, never the actual
password
❏ If written down, keep and protect it as you would a credit card
V. Enforcement
Random password audits must be performed by the Information Systems Security
Department. Users that have weak passwords as deemed by the audit will have their
data backed up and shall be submitted to a mock breach or hack scare that emulates
data loss or corruption. These employees will be subject to either disciplinary action or
training, depending on the frequency of using weak passwords.
Sources:
MIT: http://kb.mit.edu/confluence/display/istcontrib/Strong+Passwords
Stanford: https://itservices.stanford.edu/service/accounts/passwords
Symantec: http://www.symantec.com/connect/articles/simplest-security-guide-betterpassword-practices
Password Audit Results
Dictionaries used:
password.lst : http://www.openwall.com/john/doc/EXAMPLES.shtml
cain.txt : downloads.skullsecurity.org/passwords/cain.txt.bz2
english.txt : downloads.skullsecurity.org/passwords/english.txt.bz2
Username
jclark
jfox
jplain
ssummers
Password
jclark
5551234
5551212
sremmuss
Method
single
single
single
single
sjones
sjones1
single
lscott
123456789
ncuta
password1
wordlist + word
mangling rules
wordlist + word
mangling rules
jscott
trustno1
wordlist + word
mangling rules
pdill
abc123
wordlist + word
mangling rules
jpoogle
password1
wordlist + word
mangling rules
jgrumby
summer
wordlist + word
mangling rules
Reason
same as username
all numbers
all numbers
username spelled
backward
same as username
followed by a single
number
all numbers
dictionary word
followed by a single
number
common phrase
followed by a single
number
predictable simple
letter and number
combination
dictionary word
followed by a single
number
dictionary word
shagar
qwerty
wordlist + word
mangling rules
predictable pattern /
combination of
letters
common phrase
rdavid
letmein
gjefferson
money
reagle
password
jkimmel
111111
wordlist + word
mangling rules
wordlist + word
mangling rules
wordlist + word
mangling rules
wordlist + word
mangling rules
Username
Password
Method
Reason
bstubbin
Password
dictionary word
smyers
cutiepie
kstubbin
PASSWORD
root
foobar
pc
foobar
jpatrick
afgesloof
jweiss
zoftig
qlrng
matzo
abeard
cave
avanhalen
daytona
qlrng
zoftig
wordlist + word
mangling rules
wordlist + word
mangling rules
wordlist + word
mangling rules
wordlist + word
mangling rules
wordlist + word
mangling rules
wordlist using
Afrikkans dictionary
wordlist using
Yiddish dictionary
wordlist using
Yiddish dictionary
wordlist using
cain.txt
wordlist using
cain.txt
wordlist using
english.txt
dictionary word
dictionary word
all numbers
common word
dictionary word
common variable
name
common variable
name
foreign dictionary
word
foreign dictionary
word
foreign dictionary
word
predictable phrase
place name
dictionary word
Download