Taken from Hazim Almuhimedi presentation modified by Graciela Perera

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

©2002 TechRepublic, Inc. All rights reserved. Protecting Your Password Created By: Dana Norton Web Editor, IT Manager Republic.
Authentication and Constructing Strong Passwords.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Analysis of Passwords Renier van Heerden and Johannes Vorster CSIR, DPSS Research funded by DST, CSIR DPSS.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Password Management PA Turnpike Commission
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
CIS 450 – Network Security Chapter 8 – Password Security.
©2002 TechRepublic, Inc. All rights reserved. Information Security Don’t Be the Weakest Link or “But, I use a password!!”
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Session 7 LBSC 690 Information Technology Security.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
“L  kout” Initiative Choosing a Strong Password.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Protecting Your Password
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Passwords and Password Policies An Important Part of IT Control – by Craig Piercy.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Wireless & password security Mark Theeuwes. 2 Wireless basics.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Username Usage and Password Security. Username Usage.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
1. Password Guidelines 2 Weak Passwords Easy to guess Less than 8 characters long Not Complex  mix of upper and lower, numeric and special characters.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
PASSWORD SECURITY A Melbourne Athenaeum Library
Understanding Security Policies
Outline The basic authentication problem
Key words: Secure | Password | Character
System Access Authentication
Password Cracking Lesson 10.
Choosing a Strong Password
The Art of Deception.
Setting up an online account
Passwords.
Introduction to Computers
Choosing a Strong Password
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Protecting Your Password
Choosing a Strong Password
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Keeping Our Data Secure
Presentation transcript:

Taken from Hazim Almuhimedi presentation modified by Graciela Perera Text passwords Taken from Hazim Almuhimedi presentation modified by Graciela Perera

Agenda How good are the passwords people are choosing? Human issues

Authentication Mechanisms Something you have cards Something you know Passwords Cheapest way. Most popular. Something you are Biometric fingerprint

Password is a continuous problem Password is a series real-world problem. SANS Top-20 2007 Security Risks Every year, password’s problems in the list: Weak or non-existent passwords Users who don’t protect their passwords OS or applications create accounts with weak/no passwords Poor hashing algorithms. Access to hash files Source: Jeffery Eppinger, Web application Development.

Poor, Weak Password Poor, weak passwords have the following characteristics: The password contains less than 15 characters. The password is a word found in a dictionary (English or foreign) The password is a common usage word. Source: Password Policy. SANS 2006

Strong Password Strong passwords have the following characteristics: Contain both upper and lower case characters Have digits and punctuation characters Are at least 15 alphanumeric characters long and is a passphrase. Are not a word in any language , slang , dialect , jargon. Are not based on personal information. Passwords should never be written down or stored on-line. Source: Password Policy. SANS 2006

Strong Password ?

Strong Password At least 8 characters. Contain both upper and lower case characters. Have digits and punctuation characters

Password length Average: 8 characters.

Password length There is a 32-character password Other long passwords: "1ancheste23nite41ancheste23nite4“ Other long passwords: "fool2thinkfool2thinkol2think“ "dokitty17darling7g7darling7"

Character Mix

Common Passwords Top 20 passwords in order. password1 abc123 myspace1 Blink182 qwerty1 fuckyou 123abc baseball1 football1 123456 soccer monkey1 liverpool1 princess1 jordan23 slipknot1 superman1 iloveyou1 monkey

Common Password "qwerty1" refers to QWERTY is the most common keyboard layout on English-language computer.

Passwords getting better Who said the users haven’t learned anything about security?

Human is often the weakest link in the security chain. Human Issues Social Engineering. Difficulties with reliable password Entry. Difficulties with remembering the password. Human is often the weakest link in the security chain.

Human Issues Social Engineering. Attacker will extract the password directly from the user. Attacks of this kind are very likely to work unless an organization has a well-thought-out policies. In his 2002 book, The Art of Deception, Mitnick states that he compromised computers solely by using passwords and codes that he gained by social engineering. Motorola case http://www.youtube.com/watch?v=J4yH2GPiE7o (3:09) Kevin Mitnick: It's much easier to trick someone into giving you his or her password for a system than to spend the effort to hack in. http://www.youtube.com/watch?v=8_VYWefmy34 (2:00) Source: Wikipedia. Social engineering

Human Issues Social Engineering. How to solve this problem? Strong and well-known policy.

Human Issues Difficulties with remembering the password. The greatest source of complaints about passwords is that most people find them hard to remember. When users are expected to memorize passwords They either choose values that are easy for attackers to guess. Write them down. Or both.

Human Issues Conclusion: The majority of users select phrases from music lyrics, movies, literature, or television shows. This opens the possibility that a dictionary could be built for mnemonic passwords. If a comprehensive dictionary is built, it could be extremely effective against mnemonic passwords. Mnemonic-phrase based passwords offer a user-friendly alternative for encouraging users to create good passwords.