CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Lecture 6 User Authentication (cont)
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Cryptography and Network Security Chapter 20 Intruders
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
Security+ Guide to Network Security Fundamentals
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Chapter 3 Passwords Principals Authenticate to systems.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Homework #4 Comments. Passwords: What are they good for? Today passwords are the #1 means of authenticating users on a day-to-day basis. – , Websites,
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
CIS 450 – Network Security Chapter 8 – Password Security.
Lecture 11: Strong Passwords
The memorability and security of passwords – some empirical results By: Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant Presenter: Roy Ford.
FMCSA Portal Enforcement: Online Self Service Account Management Prioritization Phase I Release, December 2010 v1.0.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
Identification and Authentication University of Sunderland COM380 Harry R. Erwin, PhD.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Session 7 LBSC 690 Information Technology Security.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Chapter One: Mastering the Basics of Security
Common Methods Used to Commit Computer Crimes
Chapter 5 : Designing Windows Server-Level Security Processes
AIM/education directory (Ed dir)
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 3: Protecting Your Data and Privacy
Internet Safety – Social Media
Presentation transcript:

CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

First, Administrivia Homework: –HW#3 (forensics) collected –HW#4 (hashing) assigned. Quiz #1: –November 9 th –Covers privacy policies, security policies, HCI usability, tempest, disk forensics, network security appliances, transactional privacy, physical security, passwords, biometrics, hashing, symmetric encryption, asymmetric encryption, MD5, SHA-1, DES, AES, RSA, Diffie-Helman, PEM, PGP, S/MIME.

HW #3 Due today! Please comment in class and on website about what you learned. Forensics would be a good final project!

HW #4 Assigned today. Makes heavy use of MD5/SHA-1 –If you don’t know the basics of hashing, read WSCP Chapter 3 & Chapter 4. Easy to spend a lot of time on this. But you shouldn’t have to. Some programming is required. But not much. If you have a problem, please the staff.

Identification, Authentication, and Authorization Identification: –You give your name Authentication: –You’ve proven that it’s really you. Authorization: –We’ve looked your identity up in the database and we know what you’re allowed to do. Most say “authentication” when they mean identification or authorization. You can authenticate without identifying.

Classical Authentication Something that you know –password –pass phrases Something that you are –fingerprint –face print Something that you have –tokens –smartcards } biometrics

Passwords: What are they good for? Today passwords are the #1 means of authenticating users on a day-to- day basis. – , Websites, ATMs, Doors, Lockers, etc. Password Recovery: –Challenge/response questions –Knowledge of previous transactions

How many passwords do must you remember?

Why the explosion of passwords? Need to protect configuration information –BIOS passwords, VChip, Cell Phones, etc. Web services need persistent identification of users over time No national/international identification service

Alternatives to many passwords Single-sign on: –Master password unlocks others –PKI: password unlocks private key Examples: –Microsoft Passport –Gnu Keyring (gnukeyring.sourceforge.net)

Observed Strategies “Low security” & “high security” passwords Standard password that’s changed for every host –password-ebay –password-paypall –password-fas Change password periodically –Every 3-6 months –(Problems if you don’t manage to change all of your passwords.) Always use “password reset” and get ed a password. Write passwords down

Anderson: 3 types of password concerns 1.disclosure 2.reliability to enter 3.ability to remember

Concern #1: Disclosure Will the user break the system security by disclosing the password to a third party, whether accidentally, on purpose, or as a result of deception?

Concern #2: Reliability to enter Will the user enter the password correctly with a high enough probability?

Concern #3: Ability to remember Will users remember the password, or will they have to either write it down or choose one that’s easy for the attacker to guess?

Can you write down passwords? class discussion

Can you write down these passwords? Can you remember them? What if you had to remember 40 of them?

A Password Policy “The root password for each machine shall be too long to remember, at least 16 alpha and numeric characters chosen at random by the system; it shall be written on a piece of paper and kept in an envelope in the room where the machine is located; it may never be divulged over the telephone or used over the network; it may only be entered at the console of the machine that it controls.” [Anderson, p. 37]

Anderson’s Research Problems in Passwords: What is the best way to enforce user compliance with a password policy? Can we design interactive password systems that are better? Can we use multiple passwords? –Mother’s maiden name –Password –Amount of last purchase –Dog’s nickname –Your favorite color…

Threats to Passwords What are the threats against passwords? –Guessing –Brute force search –Shoulder surfing –Discovering passwords that are written down –Passwords collected at one website used for another Kinds of attacks: –Offline –Online

Eavesdropping risks Physical device --- key grabber Trojan Horse Tapped lines Video Camera … The need for trusted path

Kinds of Attacks: Targeted attack on one account Attempt to penetrate any account on a system Attempt to penetrate any account on any system Service denial attack

Protecting against Online Attacks: Defenses Against Guessing: –Exponential back-off –Lock out –Notification –“Cracking” Dangers of lock-out –Ebay doesn’t use it; why not?

Protecting against Offline Attacks What do you do?

Restricting Passwords Does it make sense to mandate symbols and numbers in passwords? –# of letters: 52 (26 lower + 26 UPPER) –# of symbols: 30 –# of 8 letter passwords: 52 8 –# of 7 character passwords with 1 symbol: (52 7 )(30)(8) –How about forcing 1 number and 1 symbol? (52 6 )(30)(8)(10)(7)

More on restrictions Different systems have different restrictions. –Some require special characters –Some forbid special characters. Why?

Password Generating Algorithms Multics generated passwords that were “easy to remember.” What’s wrong with giving advice on how to generate passwords? What’s the alternative? Programmatically picking passwords that are easy-to-remember

Developer Recommendations Force users to change passwords regularly Password != Username Require 8 or more characters Require a mix of alpha, numeric, and special characters Deny Access After a number of failed Attempts Do not send passwords “in the clear” Do not assign “default passwords” Overwrite passwords in memory as quickly as possible

Restrictions on Passwords: Recommendations 1-14 characters vs characters vs characters –Recommendation: Mandate minimums, but allow people to type extra characters –If you can’t handle a special character, change it to a character you can handle. –ATM networks used to ignore all characters after first 4

Recommendations on Password Aging: What should we do? Should we mandate password changes? Should we remember old passwords and forbid them?

Case Sensitivity: Recommendations Some passwords are case-sensitive; some are not. –If your passwords are not case- sensitive, they must be longer. Check password with case-flipped for CAPS LOCK ON accident.

Password Recovery What’s the best way to do it? Automatic vs. Manual “What is your favorite Color?”

Password Recovery: Recommendations Send a link that expires quickly. Specially log the IP address of the browser that clicks the link. Don’t send the password!

Web Password Hashing Internet Explorer plug-in that sends a hash of the password to every website. –Hash depends on your password & remote website –Defeats phishing! PwdHash.ppthttp://crypto.stanford.edu/PwdHash/ PwdHash.ppt