Powerpoint Available - Kansas State University

advertisement
So Many Passwords…
IT Security Roundtable
January 15, 2010
Harvard Townsend
Chief Information Security Officer
harv@ksu.edu
Agenda








So many passwords, so few brain cells…
Threats to passwords
Which ones are important?
eID password (importance, rules, policy)
Definitions (password, passphrase, etc.)
Choosing a good password
Misc. cautions/tips/tricks
Q&A
2
My accts/passwords:




K-State (eID, my office computer, my laptop, several servers,
Bluecoat PacketShaper, PGP encryption, TrueCrypt
encryption, Trend Micro OfficeScan servers, Trend Micro
support portal, Zimbra customer care portal, Zimbra “security”
shared account, LISTSERV, State of KS employee selfservice, HealthQuest health screening, IT Tuesday news
authoring, IT Security Threats blog, network usage graphs)
Shopping (PayPal, amazon.com, expedia.com, iTunes, REI)
Financial (checking acct, two savings accounts, ATM PIN,
retirement accts, credit cards, health insurance, flexible health
spending acct, auto loan, home mortgage)
Other personal (cell phone, cell phone provider, Internet
provider, cable TV, Netflix, Pandora, Skype, Facebook,
Gmail, Yahoo!, Flickr, K-Tag, mission work, charitable
organizations, Manhattan Mercury, State Dept (travel
advisories), several airline frequent flier accts, UFM,
trails.com, job applications, etc.)
3
What’s a feller to do?

Same password everywhere?





Rely on your memory?



PLEASE, NO!!!
If one is compromised, all are compromised
Different systems have different pw rules
Violates K-State policy about eID passwords
Value is inversely proportional to your age!
You’ll often click on “Forgot Your Password?” links!
Write ‘em down?



Risky, but not out of the question if you keep the note in a safe
place (NOT your desk pencil drawer)
Bigger issue is quantity of passwords you have to remember
Generally considered a bad idea
4
What’s a feller to do?

Let your browser store them all?







OK for some passwords, but not others
Too risky for accounts with access to sensitive information
Easy for someone to view the stored passwords, unless you…
Use Firefox and password-protect viewing stored passwords…
and don’t forget THAT password!
DON’T do it with your eID password, financial accounts,
anything with access to personal identity info (like SSN)
Never do this on a shared, lab, or public computer
IE stores browser (“AutoComplete”) passwords in Registry



Free tools readily available to recover them.
Delete in IE8 with Tools->Internet Options->General->
Browsing history->Delete, check the “Passwords” box
Firefox had built-in tool to view them and delete them
(Tools->Options->Security->Saved Passwords); be sure to use
a “Master Password” to protect the stored passwords
5
What’s a feller to do?
Use the same password for similar categories of accounts
 Reasonable solution
 Have at least four categories:
1.
2.
3.
4.




Financial
eID and other important K-State accts
Shopping accts that store your credit card info
Innocuous accts w/ no sensitive information
#1 and #2 should be long, complex, and changed
regularly
#3 not as long, less complex, changed less often
#4 can be short, simple, never changed
Differing password rules may pose a challenge
6
What’s a feller to do?

Use a password management tool






Software that organizes and stores (encrypted) passwords
Effective way to manage many passwords
Relies on a single master password to protect all the other
passwords
Can be a challenge if use multiple computers since password
database usually stored locally; are tools available that work on
multiple computers, but that means your passwords are stored
on the company’s server(s). Do you trust them? Example is
lastpass.com
Windows example: Password Safe
passwordsafe.sourceforge.net
Mac example: Password Gorilla
www.fpx.de/fp/Software/Gorilla/


Also available for Windows and Linux
Can read Password Safe database
7
Password Safe Demo






Windows only
Available for free at
passwordsafe.sourceforge.net
Mature product, lots of nice features
Has a sophisticated password generator
Allows you to jump to a web site and
auto-enter the username/pw used for that
site.
Demo…
8
Other Strategies?

How do you manage your passwords?
9
Threats to Passwords



Keyloggers – a program that records every keystroke and
sends it to the hacker; can be configured to watch for
passwords or other account information
“Sniffing” the network – someone intercepting network
traffic; wireless networks particularly vulnerable
Malware that gives the hacker full control of a computer and
access to anything on it



“Torpig” malware infected 27 K-State computers in the last
year – watches Internet traffic and intercepts bank acct info,
username/pw
Hackers stealing passwords from a compromised server
Password “cracking” - a hacker being able to guess your
password, usually with the help of a computer program


Programs to do this are readily available on the Internet
Faster computers make this easier
10
Threats to Passwords


Internet cafés – a favorite target for hackers to use keyloggers or
other forms of malware to interecept acct info and passwords
Phishing – tricking you into providing account information







431 K-Stater’s replied to phishing scams with their eID passwords in
2009
377 were used by criminals to login to Webmail and send spam
Consider what can be accessed with your eID…
“Spear phishing” – phishing that targets a specific population, like
sending an email to K-Staters to steal eID passwords
“Shoulder surfing” – someone looking over your shoulder as you
type
Web browsers storing your password – is easy for someone else
using your computer to see or use your password(s)
Typing your password into the wrong place on the screen
11
Threats to Passwords



Sharing your password with a friend or family
member
Giving your password to someone who is
helping you with a computer problem
Disgruntled system administrator or others
with privileged access to servers
Bottom line – the threats are real and
happening at K-State. Take password
security seriously!
12
Which passwords matter?
Pay particular attention to these passwords; make
them complex, long, and change them regularly
 Anything that provides access to sensitive
information:






Bank account
Credit/debit card account
Personal Identity Information (name + SSN, for
example)
Shopping account that stores credit card data;
normally credit card # is masked, but person could
change shipping address and spend lots of money
Administrator or root accounts on servers
K-State eID
13
eID Password

What’s the big deal with eIDs? Gains access to:











HRIS self-service
Email
iSIS
K-State Online
eProfile (eid.ksu.edu) w/ emergency contact info
Oracle Calendar
K-State Single-Sign-On environment
Access to licensed software, databases
SGA elections
University Computing Labs
Student access to network in residence halls
14
eID Password

What’s the big deal?






431 people at K-State replied to phishing scams in 2009, giving
away their eID password
377 of them were used by criminals to login to K-State Webmail
(often from Nigeria) and send hundreds of thousands of spam
messages
Compromised accounts are locked so hacker can’t use it, which
means the legitimate owner can’t use it either
K-State seen as a source of spam and put on spam blocklists,
resulting in all email from K-State being blocked by the likes of
Hotmail, Gmail, Yahoo!, Comcast, Road Runner, Cox, AT&T,
etc. Thus one person’s mistake can affect the entire campus
Contributes to spam, the scourge of the Internet
Recently, hackers haven’t used stolen passwords right away,
sometimes waiting 3-4 months before using it. Thus if in the
mean time the password is changed by the legitimate owner, the
hacker can’t use the account. Is a good case for regular
password changes.
15
eID Password Policies
http://www.k-state.edu/policies/ppm/3430.html#require
Why do you have to change it?

The longer you have the same password the more likely
someone will discover it (because of the threats just
discussed)




eID passwords stolen in spear phishing scams not used
until 3-4 months later!
Changing it limits the amount of time a hacker can wreak
havoc in your life
Changing your password regularly is standard best
practice
It could be worse! (most standards specify a change
every 30-90 days)

Pending state security policy requires change every
30/60/90 days depending on sensitivity of account
16
eID Password Policies
http://www.k-state.edu/policies/ppm/3430.html#require

Do not share it… with anyone!


Do not use it for non-university accounts



NEVER give your password in an email!!!!
Such as hotmail, amazon.com, bank
Is okay for departmental servers (is an
acceptable risk)
Can I write it down?
“Passwords
that are written down or stored
electronically must not be accessible to
anyone other than the owner and/or issuing
authority.”
17
eID password rules



7-30 characters in length (longer is better)
Must contain at least 5 different chars
Must contain 3 of the 4 following:







Uppercase letters
Lowercase letters
Numbers
Special characters (!, @, #, &, etc.)
Can’t be based on eID or real name
Cannot contain recognizable word, phrase,
acronym, or K-State related name
Can’t be on of 4 million+ words in hacker
dictionary
18
eID Password Policies
http://www.k-state.edu/policies/ppm/3430.html#require



These policies apply to ALL K-State
passwords, not just the eID
Enable the password on your screen
saver
Lock your computer screen when you
leave it unattended
19
Authentication & Authorization




Authentication (AuthN) – verify who you
are
Authorization (AuthZ)– determine what
you are allowed to do
Your eID (or other username) and
password provide authentication
After authN, the system or application
determines what you can access (authZ)
20
Forms of Authentication
Weak




4-digit PIN (aka Passcode)
Username/Password
Challenge-Response (aka “security question”)
Two-factor Authentication




Strong


Two different methods required to authN
Something you know plus something you have
(e.g., PIN + bank card)
Biometrics (e.g., thumbprint reader)
Passphrase
One-time passwords
Digital signature
21
Passphrase




A passphrase is password consisting of a sequence of words
or other text. It’s similar to a password in that it controls
access to a computer or system, but it’s generally longer for
added security (should be 20-30 chars). A good rule of thumb
is to purposely misspell at least one or preferably a few words
in the passphrase, mix words up from different languages,
and/or add symbols to the words.
Advantage is in its length (more secure) and ease of
remembering since you can use a familiar phrase or sentence
eID password can now be a passphrase, using words and
spaces, but same complexity rules apply (must use digits,
mixed case, special characters, etc.)
Can be frustrating since is harder to type a long passphrase
error-free when you can’t see what you’re typing. Using a
password manager like Password Safe or Gorilla allows you to
submit a long password without typing it.
22
Challenge-Response
(aka “security questions”)

Present a challenge (i.e., a question) that only the
authentic owner of the account should know, then
require a correct response before continuing






Common example is asking your mother’s maiden name,
or your first pet, or the city you were born in
Online banking often makes you establish a set of
question/answers, then poses one (in addition to your
password) when you login from a different location
Also used for resetting an account password
Treat these like a password – put effort into choosing
effective questions and answers, ones not easily
discovered via a Google search of your name
Sarah Palin’s Yahoo email was broken into during 2008
campaign by guessing her three security questions.
For more information:
itnews.itac.k-state.edu/2008/12/palin-email-password- 23
security/
Beware of keeping yourself
logged in via the browser
Anyone using the computer
has access to the account
This is slightly different from having the browser/OS
save your passwords, but the same end result –
anyone using the computer has access to your account.
24
Other password news

SIRT subcommittee developing
recommendations for updating password
policy




Implement account lock-out (lock account
after X failed logins)
Add a password strength meter where eID
passwords are changed
Prepare for higher
minimum length
NEVER give out
your password
in an email!!!!
25
Hints for Choosing a
Strong (eID) Password



General rule – hard to guess, easy to
remember (strong, memorable)
You could let eProfile (eid.ksu.edu)
choose one for you (not ideal since is
random, so is hard to remember and you
will likely write it down)
Better to come up with a system that
makes sense to you and accommodates
regular changes without a lot of effort
26
Hints for Choosing a
Strong (eID) Password

Use character/word substitutions









“2” instead of “to/too”
“4” for “for”
“4t” for “Fort”
“L8” for “late” (r8, g8, b8, d8, etc.)
“r” for “are”
“u” for “you”
“$” for “S”
“1” (one) for “l” (el) or “i” (eye)
“!” for “1”, “l”, or “i”
27
Hints for Choosing a
Strong (eID) Password


Capitalize letters where it makes
sense to get upper/lower case mix
Take a phrase and abbreviate it:


2Bor~2b! = “To be, or not to be”
Watch custom license plates for ideas

im4KSU2 (and add punctuation, like “!”)
28
Hints for Choosing a
Strong (eID) Password

Use a password strength meter:
www.passwordmeter.com
www.microsoft.com/protect/yourself/password/checker.mspx

Gotchas:


Beware of special characters that are not on
foreign keyboards (e.g., $)
What are your tips and tricks?
29
The gospel according to
Microsoft
http://www.microsoft.com/protect/yourself/password/create.mspx
1.
2.
Think of a sentence that you can remember
as the basis of your strong password or pass
phrase. Use a memorable sentence, such as
“My son Aiden is three years old”
Check if the computer or online system
supports the passphrase directly. If you can
use a pass phrase (with spaces between
characters), do so.
30
The gospel according to
Microsoft
3.
4.
If the computer or online system does not
support pass phrases, convert it to a
password. Take the first letter of each to create
a new, nonsensical word. Using the example
above, you'd get: “msaityo”
Add complexity
Mix uppercase and lowercase letters and numbers.

Swap some letters or intentionally misspell.
“My SoN Ayd3N is 3 yeeRs old”

31
The gospel according to
Microsoft
5.
Substitute some special characters


Add punctuation (“!”, “;”, “()”, etc.)
Use symbols that look like letters

“$” for “S”, “3” for “E”, “1” for “i”, “@” for “a”
Combine words (remove spaces).
“MySoN 8N i$ 3yeeR$ old;” or “M$8ni3y0;”
Test your new password with Password
Strength Checker and/or eProfile (eid.ksu.edu)

6.
32
What’s on your mind?
33
Download