Rethinking Password Policies
|
|
|
- Jessie Hensley
- 9 years ago
- Views:
Transcription
1 Rethinking Password Policies Abe Singer, Warren Anderson, Rik Farrow August 2013 In the practice of security we have accumulated a number of rules of thumb that many people accept without careful consideration. Some of these get included in policies, and thus may get propagated to environments they were not meant to address. It is also the case that as technology changes, the underlying (and unstated) assumptions underlying these bits of conventional wisdom also change. The result is a stale policy that may no longer be effective or possibly even dangerous. Gene Spafford [23] We are all familiar with having rules for passwords: must have at characters from various character sets, have a minimum length, get changed regularly, not be written down, etc. These rules are supposed to make passwords secure, but there s little to no research to support that argument. In fact, they can even weaken security. Most of the best practices in use today are based largely on folklore, or in some cases on severely outdated theories of password strength. Even the US Government standards on password strength appear to be based on nothing more than then-current default settings on a particular operating system. These password best practices have several usability problems. Some believe that security and usability are mutually exclusive, and therefore security has to make things difficult. We argue that security depends on usability. Passwords have to be strong enough to defeat cracking attempts, yet usable. This requires both an understanding of usability, and quantitative measurements of password strength. Below we provide a summary of the relatively scant research and government standards that have led to where we are today, an overview of usability as it applies to security, an analysis as to how current best practices aren t effective, and finish with a modest proposal for more usable and secure passwords. Why do we have password rules? An attacker can try to discover passwords using guessing attacks, whereby the attacker tries various passwords to find one that matches that of the target. The simplest form of such attack is a brute-force attack trying every possible password (the entire key space). This approach guarantees that the attacker will eventually find the password, if the attacker has enough compute resources to do so. 1 of 12
2 Users, left to their own devices, tend to choose passwords using real words and simple variations of them. Which is understandable users want to have a password that s easy to remember. Attackers, knowing this, use dictionaries of real words for dictionary attacks (cracking). If the dictionary is considerably smaller than the keyspace, the computational cost of the attack is much smaller than that of a brute force attack. Password strength rules ostensibly force the user to choose a password that s not in the attacker s dictionary. More formally, the rules attempt to prevent successful dictionary attacks, by ensuring that users choose passwords with sufficient entropy to render the attack infeasible. Entropy is the measure of the probability distribution of the passwords across the keyspace; a measure of the relative randomness of each password to all the other passwords. Note that password strength rules provide no protection from brute-force attack. (To be clear, a brute-force attack is an exhaustive attack against the entire keyspace, a dictionary attack is an attack against a smaller subset of the keyspace). So how did password rules evolve into the current best practices? Here s a brief history. Some history of password attacks, and rules. The problem with using passwords that are derived directly from obvious words is that when a user thinks Hah, no one will guess this permutation, they are almost invariably wrong. Who would ever suspect that I would find their passwords when they chose fylgjas (guardian creatures from Norse mythology), or pataitai (the Chinese word for hen-pecked husband )? Dan Klein [24] Passwords for computer use date back to at least the 1960s. The first mention of computer passwords in open literature was on the MIT Compatible Time Sharing System (CTSS), which was one of the first (if not the first) multi-user operating systems. At that time, passwords were used to separate and identify users, in order to control users use of limited resources such as CPU time. The desire and attempts to compromise passwords has been around about as long. A graduate student on the CTSS system, who needed more compute time than allocated, admitted to have taken advantage of a bug in the system to obtain a copy of the password file, which was not encrypted/hashed. [25] Dictionary attacks were first discussed in [8] At that time, the passwords were hashed, and the hashes were kept in the passwd file and readable by all users. Morris and Thompson acknowledge the threat of dictionary attacks, using a dictionary of English words. [8] also proposed the first example of password rules, where users were required to choose a password of at least a minimum length (6 characters for alphabetic, 5 characters if the password included non-alpha). They alternatively proposed system-generated random passwords while noting a case where that approach actually weakened password security. The Green Book [9] discusses strength of crypto algorithms, and includes suggestions for password length and generation. 2 of 12
3 On the latter point, we note that it specifically recommends that password be machine generated due to users choosing bad passwords. The Green Book also recommends that users memorize their passwords, but allows for writing down passwords as long as the written password is sufficiently secured. While dictionary attacks were discussed as far back in 1979, the first openly published program to do so was Crack, posted to Usenet by Alec Muffet in [10] Discussions about the posting acknowledged that underground tools had been available to attackers for years. Around the same time, Bellovin notes that attackers had been observed trying to download the password file from Bell Labs ftp servers. [26] Crack was intended for use by system administrators to run a dictionary attack against the hashed passwords on their systems, to detect and change weak passwords hopefully before an attacker could do so. Muffet and others also acknowledge that a preferred approach would be to prevent users from entering dictionary words in the first place, but tools to do so were not yet available, and vendors were slow to implement such features (Indeed, it was more than a decade before such capabilities commonly available). On a side note, we found it interesting in retrospect that the publication of Crack was quite controversial at the time. Many people thought it wrong to release a hacker tool that could be used by attackers. The counter argument was that the attackers already had the tools, and the publication of Crack provided defenders with a tool to fend off attackers. These days, tools such as Crack are considered a standard component of a defender s toolbox, and there is no controversy about it. In , Klein [7][24] ran dictionary attacks against a set of ~15,000 encrypted passwords contributed by volunteers. Armed with a ~62,000 word dictionary, Klein cracked approximately 39% of the passwords. At that point in time, the Unix and other password entry systems did not impose any restrictions on what password a user could choose; obtaining strong passwords was expected to get addressed with user training. Klein and Bishop proposed pro-active password checking, whereby the password setting program would check the password entered by the user against a dictionary and for certain compositional aspects such as upper/lower case.[7] A similar, but less rigorous, proposal was made in [12]. The authors not only performed password cracking, but pre-computed hashes for dictionary words and stored them, so that successive cracking attempts could be done without having to recompute hashes each time. At the time, due to I/O limitations, their approach made cracking 28 times faster than computation. In 2003, the Teracrack project repeated the pre-computation experiment with much larger dictionary, and for all 4096 salts used for Unix password hashes. The results took up 1.5 Tb of storage, and reduced the time to attempt to crack any one password hash to a maximum of a couple of minutes the time required to load and read a tape from the library. The same technique today could be stored on a single hard disk and search time reduced to the disk seek time. Note that this approach only is feasible for Unix DES salts, the MD5 hashes used on newer versions of Unix/Linux use a 20 bit salts, making the storage requirements much too large in todays environment. [13] Standards for Password Rules 3 of 12
4 One would think, with the research done on the guessability of passwords, that the current best practices for password rules have been based on rigorous research and analysis, resulting in thoroughly documented standards. In reality, what few standards exist are based on inconsistent research at best, and in some cases appear to be pulled out of thin air. NASA s password requirements are representative of the common best practice for password strength. [14] The document claim to be in compliance with the Federal Desktop Core Configuration. [15] However, we could find no documents within the FDCC provide specific password complexity requirements. A search for Federal documents on password strength came up with the following data, which is itself incomplete and inconsistent: [17] notes that users are bad at choosing passwords and recommends that passwords be automatically generated. [18] states that Passwords shorter than 10 characters are usually considered to be weak and Passphrases shorter than 20 characters are usually considered weak, but does not provide any justification or citations for those statements. [19], notes the difficulty in measuring the entropy of user chosen passwords. [20] mentions password composition as a factor in password requirements, but leaves the specific requirements up to the organization. [21] does not give specific requirements for password strength, but suggests that users be trained on good password practices and that systems might restrict password choices based on password composition. It also gives suggestions for choosing good passwords such as using the first character of a well known phrase, etc. The document also notes the difference between the keyspace of the password hashing scheme and what users actually pick: When determining policies for password length and complexity, organizations should consider maximum and likely actual keyspace. [22] states that Totally alphabetic password composition should be discouraged. The first case we could find of the current common practice of requiring characters from different character sets is from Microsoft. Microsoft Windows NT Service Pack 2 introduced password strength requirements with a minimum length of 6 characters, and the password must contain at least one character from the four character sets of A-Z, a-z, 0-9, and special or punctuation characters. Microsoft gives no justification or citations for those requirements, and the requirements were hard coded. Windows 2000 allowed for changing of the requirements, but left the default the same as in NT but with a minimum password length of 8 characters. Password Aging There s no there there. Gertrude Stein 4 of 12
5 Aging passwords requiring users to change passwords at regular intervals originated due to the use of hashing algorithms which were weak enough to be subject to a brute force attack. Password aging is a defense against brute force attacks, not dictionary attacks. The Green Book [9] details the relationship between password length and password lifetime, and includes formulae for calculating minimum password length. Note that at the time that the Green Book was written, brute-force attacks against the hash algorithms in use were considered within reach of government funded agencies. NIST SP [21] comments on password lifetime limits: Password expiration is also often a source of frustration to users, who are often required to create and remember new passwords every month or two for dozens of user accounts. [...] In cases where password hashes are at significant risk of compromise, organizations should take estimates of cracking abilities into consideration when setting policies for password expiration, length, and complexity. For Windows 2000, Microsoft stated Where security is a concern, good values [for password lifetimes] are 30, 60, or 90 days. Where security is less important, good values are 120, 150, or 180 days. [27] But they do not provide any definition for what important and less important are, nor how they calculated those numbers. Defaults password lifetimes in Windows 2000 were 42 days. None of these recommendations provide any analysis as to how much, if any, password aging reduces the risk of dictionary attacks. For any given password aging interval n, assuming some unknown attack on the passwords has equal probability of discovery at any point over n, the mean exposure time for a compromised password is n/2. It would seem that for any reasonable value of n, the exposure time would be unacceptable. We argue below that eliminating password aging contributes greatly to the usability of passwords. Passwords and Usability This belief of the fundamental conflict between strong computer security mechanisms and usable computer systems pervades much of modern computing. According to this belief, in order to be secure, a computer system must employ security mechanisms that are sophisticated and complex and therefore difficult to use. Matt Bishop [4] Computing professionals have long held onto the belief of an inherent tension between security and usability, that each works against the other, which has often led to a disregard of usability for the sake of securing systems. But that belief turns out to be a misconception based largely on a lack of understanding of the meaning of usability. So what do we mean by usability in the context of security? Usability is often associated with perceived ease of use the less effort required, the more usable the system. More fundamental properties of usability are [2][3] 5 of 12
6 Is the user able to understand what is required of her; Can the user understand how to use the security mechanism properly, recognize when she s failed, and understand why? Is the user capable of using the mechanism properly? Does the user understand the goal of the security mechanism; Is the user motivated to follow the security requirements? Do the requirements and interface match the user s understanding of the security goals? The study of Human Factors separates tasks into production tasks and supporting tasks (sometimes called enabling tasks. ) [4]. Production tasks are the actual end goal of the user, the desired output. Supporting tasks are those that enable the user to work on the production tasks. For example, a user authenticating herself to the system enables the user to access data on the system. Accessing the data is the production task, and authentication is the supporting task. Users don t want to spend time on supporting tasks those that have too much of an impact on production tasks affect the usability of the system, and productivity of the users. Ease of use is an important factor, but does not completely equate with work factor; The work factor of supporting tasks can involve not only physical time and effort, but cognitive load, the measure of the ability of people to learn [5]. The amount of mental effort a user has to expend on understanding security requirements and complying with them are all a cognitive load that affects the size of the supporting task. In order for a security mechanism to be used properly, the user must be able to understand both how and why to use it, and be able to use it efficiently. Security depends on usability. The usability of common password requirements Does added security make things more difficult to use? Will people always resent the extra steps? The answer to both questions is the same: Not necessarily. Consider the physical world of doors and locks. Locks on houses, cars, and private records get in the way of easy access, but are tolerated because they seem necessary and the amount of effort required to open them usually seems reasonable. Note the two different components: the understanding of the necessity for protection and the reasonableness of the effort required. Both are design issues. And both require at their base, a coherent, understandable conceptual model of both the need for security or privacy and the workings of the mechanisms that enforce them. Don Norman [28] Common password requirements have a negative impact on the usability of passwords. Namely: rules for password complexity requirements to change passwords on a periodic basis (password aging) requirements to not reuse old passwords prohibitions against writing down passwords As we noted above, some of these rules were originally devised in a context that does not apply in all contexts. Here we discuss how these rules impact usability, and the ensuing risks. Password Complexity and Aging 6 of 12
7 Password complexity rules make the user expend time and effort to devise an acceptable password, and then memorize it immediately. This imposes a cognitive load on the user and increases supporting task work factor. [2] notes the inherent cognitive conflict between the requirement that a password be effectively difficult to remember and the requirement that passwords never get written down. Password aging further increases the cognitive load and work factor, by forcing the user to repeat the process of devising and remembering passwords repeatedly. The negative impact of this combination of rules has been noted in several places. A study on password usage within the FAA [6] quantified the direct cost in staff time in changing passwords, noting that the costs were greatly magnified by the fact that users had numerous (up to 20!) passwords for different systems, all with different password rules and aging policies. Users were essentially in a steady-state of changing passwords. This same study noted that due to the burden of remembering passwords, coupled with the impact of forgetting passwords on production tasks, that users adopted numerous coping strategies, which were in turn violation of other security policies: leaving sessions logged in, sharing passwords with coworkers, writing passwords down, etc. Even the federal government acknowledges that password changing can cause problems. The FIPS guidelines actually acknowledge that the load on users created by frequent password changes creates its own risks, which in many contexts outweigh those created by changing a password less frequently. [4] And here s the fun part: there is absolutely no risk justification for any of the time intervals (42 days, 3 months, 6 months, 1 year) seen in current best practices. As far as we can tell, all of those numbers have been pulled out of thin air (or less well-lit regions). Usability of Pro-Active Password Checking When [7] originally proposed pro-active password checking, it seemed like an effective approach: Avoiding dictionary attacks was best solved by preventing users from entering passwords that were in the dictionary. That approach assumes, of course, that one can check against a dictionary that s at least as good as any attacker would use. Computation power in 1992 was such that a reasonably modest dictionary of 100,000 words or so, plus common substitutions, was sufficient to deter attacks. But current computational power, combined with easy on-line access to wordlists in the millions, has changed the landscape. We made an attempt at implementing pro-active checking by doing what an attacker would do: creating the biggest dictionary we possibly could. Using 1-grams from the Google Book project. [29] We started with a list of ~4,000,000 words, and after applying the Crack substitution algorithms, ended up with a dictionary of about 90,000,000 passwords. Having users change their passwords while checking against the dictionary was a colossal failure. There were so many unacceptable words that users became frustrated trying to come up with an acceptable password, an ended up choosing randomly until one was accepted by the system. Pro-active password checking fails usability because it s impossible for the user to understand how to comply with the rules without guessing, and ends up increasing both the work factor and cognitive load of choosing a new password. 7 of 12
8 Risks of Writing Down Passwords The prohibition against writing down passwords is an assumed mandatory requirement. [2] So the user is forced to devise a difficult to remember password, and then immediately remember it, further exacerbating the cognitive load on the user. [4] Add to this the often times useless feedback provided to the user while attempting to create an acceptable password. But that risk from writing down passwords is very context dependent. Prohibition against writing passwords hails from the military, where the threat of an malicious insider (a spy) looking for written down passwords was substantial, and the liability of that risk, astronomical. That threat may be substantially lower in other contexts, where the threat of password guessing from a remote anonymous attacker is much higher. And, as mentioned above, the burden of having to remember passwords causes users to take other measures that can impose equal or greater risks. Writing down passwords reduces the cognitive load for users, especially for passwords that get used infrequently. Writing down passwords is also perceived as being very insecure because the passwords may get left someplace they are easy to discover. That risk can be easily mitigated with some simple rules for keeping the written password in a reasonably secure location (e.g. wallet, locked desk, etc.). Note that eve the Green Book also recommends that users memorize their passwords, but allows for writing down passwords as long as the written password is sufficiently secured. In many environments, the risk of dictionary attacks against passwords greatly outweighs the risk of writing down passwords; strong passwords are more important than memorable passwords. Single Sign On The FAA study noted that many subjects had numerous passwords to remember. [6] Reducing the number of password that users have to remember greatly reduces cognitive load. A singlesign-on system, where the user has to remember and use one at a given interval (e.g. every 24 hours), has a profound effect on usability. [2] Passwords and Entropy People often speak of password entropy as a measurement of password strength, and attempt to measure the entropy of a given password. But as stated above, entropy is the measurement of the relative randomness of all the passwords together you can t measure the entropy of a single password. The only way to guarantee high entropy of user chosen passwords is to require users to enter passwords that are significantly different than other passwords. But the only way to achieve that is to reject the user s new password as being too similar to another password, which in turn provides hints about the composition of another password on the system. And the user would have no way of knowing what passwords would be considered acceptable without repeatedly trying passwords until one was accepted a usability failure. Password character class rules fail to provide any guarantees of entropy because they do nothing to prevent users from choosing the same or similar passwords. 8 of 12
9 Improving the Usability and Security of Passwords at the Same Time Here s a modest proposal to make password management more usable for users, and improve the entropy of the passwords at the same time. First, provide single/common sign on to minimize the number of passwords the user must remember (reducing cognitive load) and the number of times the user has to authenticate (minimize supporting tasks). Allow the user to write down her password, as long as it s done in a reasonably secure manner, reducing cognitive load, and reducing the need for users to adopt insecure coping strategies. Eliminate password aging, minimizing work factor and cognitive load for devising and remembering new passwords. Only require password change when the password may have been compromised. To minimize compromise, prohibit (or at least discourage) the users from using the same password at sites out of your control. Eliminating aging means that you need sufficient password entropy to prevent a dictionary attack. Even if you don t eliminate aging, you need to still need to be able to quantify the entropy, in order to determine an aging interval that has acceptable risk. So you need to implement password rules that guarantee sufficient entropy across the set of user passwords. But here s the rub: when you let users choose their own passwords, you can t devise password rules that are both usable and have enough entropy. We will be authoring a paper in the near future that demonstrates this. One answer to that dilemma is to not let users choose their passwords, but to generate passwords for them using a random algorithm. It s an easy (perhaps only) way to assure entropy, and when done right, can be usable. At least, if the random passwords are sufficiently memorable (and typable), they can be more usable than requiring the user to choose a complicated, difficult to remember password that she can t write down and have to change often. While the cognitive load of learning the new password may be greater (and we re not sure that it s true), it doesn t have to be much greater, and can be offset by allowing the user to write it down. The above combined approach creates a grand bargain with the user: in return for not being able to choose her own password, the user will only have to learn this one assigned can write it down to aid with memorization, and will never (normally) have to change it. Reasonably Memorable Random Passwords There is a standing assertion that random passwords are difficult to remember and therefore fundamentally unusable. [4][3] However, these assertions turn on assumptions as to how those passwords get formed, e.g. random strings of characters. We argue that if done properly, they can be reasonably usable and memorable. In order to randomly generate usable passwords, consider that not all users are the same; their criteria for acceptable passwords can vary: 9 of 12
10 A short, complicated password requires less typing. A longer alpha-only password that s easy to enter via iphone or tablet A very long password that s easy to remember, e.g. a pass-phrase. Random generation of passwords can be acceptable when the user is given a set of choices within the constraints of the password entropy requirements. Giving the user a limited set of choices also gives the user the opportunity to select a password they find more memorable, reducing cognitive load. To demonstrate, consider the following set of choices, which were generated randomly: Passwords generated from a word list Lower case alphabetic passwords Alpha-numeric passwords Mixed case alphabetic passwords Random passwords opinion parting theological infrastructure lecture vividly vukizocylqhxzxiexq qgmblqmtngtiurtybj khjd2gjact31koo7 ntrv5xbrvdbt6d05 ywcgyrwidubbsl zmblwdafvquipq im&c<z+i)<t^ XvG[9Hm8klpN Our experience (albeit anecdotal) with this system found that the passphrases are reasonably easy to remember. Generating memorable random passphrases requires drawing from a dictionary of words that are already well familiar to the user. The average English-speaking adult vocabulary is 20,000-50,000 words [16], but that list includes words the user recognizes, but does not know well enough to spell or remember. Using a dictionary of the 10,000 (or less) most frequent words seems to provide passphrases that are sufficiently memorable to the user. References [1] National Security Agency, Guide to the Secure Configuration of Red Hat Enterprise Linux 5. Revision 4.2. August 26, of 12
11 [2] Anne Adams and Martina Angela Sasse Users are not the enemy. Commun. ACM 42, 12 (December 1999), DOI= / [3] Saltzer, J.H.; Schroeder, M.D., "The protection of information in computer systems," Proceedings of the IEEE, vol.63, no.9, pp.1278,1308, Sept doi: /PROC [4] Lorrie Cranor and Simson Garfinkel Security and Usability. O'Reilly Media, Inc. [5] Horcher, A.-M.; Tejay, G.P., "Building a better password: The role of cognitive load in information security training," Intelligence and Security Informatics, ISI '09. IEEE International Conference on, vol., no., pp.113,118, 8-11 June 2009 [6] Allendoerfer, K., & Pai, S. (2006). Human factors considerations for passwords and other user identification techniques part 2: Field study, results and analysis. (DOT/FAA/TC-06/09). [7] M. Bishop and D. Klein, Improving System Security Through Proactive Password Checking, Computers and Security 14(3) pp (May/June 1995). [8] Robert Morris and Ken Thompson. Password security: a case history. Commun. ACM 22, 11 (November 1979), DOI= / [9] DoD Password Management Guideline, CSC-STD , Library No. S-226,994 [10] Muffet, A. ( ). Is an apology necessary for posting Crack? (Longish). comp.sources.d. 1d5c07758f3?#997391d5c07758f3 [12] David C. Feldmeier and Philip R. Karn UNIX Password Security - Ten Years Later. In Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO '89), Gilles Brassard (Ed.). Springer-Verlag, London, UK, UK, [13] Perrine, T. The End of crypt() Passwords... Please?, ;login: issue: December 2003, Volume 28, Number 6 [14] HQ Domain Passwords Frequently Asked Questions (FAQ s), August 20, Downloaded from [15] NIST Federal Desktop Core Configuraiton. [16 Vocabulary. 24 July :07 UTC. In Wikipedia: The Free Encyclopedia. Wikimedia Foundation Inc. Encyclopedia on-line. Available from [17] Helen M. Wood. The Use of Passwords for Controlled Access to Computer Resources. Volume 500, Issue 9 of Computer science and technology, NBS special publication. U.S. Department of Commerce, National Bureau of Standards, [18] Meltem Sönmez Turan, Elaine Barker, William Burr, and Lily Chen. Recommendation for Password-Based Key Derivation Part 1: Storage Applications. NIST Special Publication National Institute of Standards and Technology. December of 12
12 [19] William E. Burr, Donna F. Dodson and W. Timothy Polk. Electronic Authentication Guideline. NIST Special Publication National Institute of Standards and Technol- ogy. April 2006 [20] Recommended Security Controls for Federal Information Systems and Organiza- tions NIST Special Publication National Institute of Standards and Technology. August [21] Karen Scarfone and Murugiah Souppaya. Guide to Enterprise Password Management (Draft). NIST Special Publication National Institute of Standards and Technology. April [22] Announcing the Standard for PASSWORD USAGE. Federal Information Processing Standards Publication 112. National Institute of Standards and Technology [23] Gene Spafford, Security Myths and Passwords, CERIAS Blog, April 19, [24] Klein, D. V.; "Foiling the Cracker; A Survey of, and Improvements to Unix Password Security." In Proceedings of the USENIX Security Workshop, Summer [25] Robert McMillan, The World s First Computer Password? It Was Useless Too. Wired.com [26] Steven M. Bellovin. There be dragons. In Proceedings of the Third Usenix Unix Security Symposium, pages 1-16, September [27] William R. Stanek. Microsoft Windows 2000 Administrator's Pocket Consultant. Microsoft Corporation [28] Norman, D. A. When security gets in the way. Interactions, volume 16, issue 6: (2010). [29] Google Books Ngram Viewer of 12
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Cal State Fullerton Account and Password Guidelines
Cal State Fullerton Account and Password Guidelines Purpose The purpose of this guideline is to establish a standard for account use and creation of strong passwords which adheres to CSU policy and conforms
Password Manager with 3-Step Authentication System
Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London [email protected], [email protected] Abstract: A big
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
Guide to Enterprise Password Management (Draft)
Special Publication 800-118 (Draft) Guide to Enterprise Password Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya NIST Special Publication
Integrating Security and Usability at Requirement Specification Process
Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.
HP ProtectTools Windows Mobile
HP ProtectTools Windows Mobile White Paper Introduction... 2 Risks... 2 Features... 3 Password Hashing... 4 Password Generation... 5 Password Types... 5 Strong Alphanumeric Passwords... 5 Password Lifetime...5
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Tax and Accounting Document Delivery
Tax and Accounting Document Delivery Encrypting PDF Files in Email Attachments: Reduce Risk, Automation and Compliance Administrative Items 90 Minutes (Education, Demo, Q&A) Participants are muted. Please
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
Authenticating Humans
29 Oct 2015 CSCD27 Computer and Network Security Authenticating Humans CSCD27 Computer and Network Security 1 Authenticating Computers and Programs Computers and programs need to authenticate one another:
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
CAPITAL UNIVERSITY PASSWORD POLICY
1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong
Technical Report. The memorability and security of passwords some empirical results. Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Technical Report UCAM-CL-TR-500 ISSN 1476-2986 Number 500 Computer Laboratory The memorability and security of passwords some empirical results Jianxin Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Your Password Complexity Requirements are Worthless. Rick Redman KoreLogic www.korelogic.com
Your Password Complexity Requirements are Worthless Rick Redman KoreLogic www.korelogic.com Introduction Rick Redman < [email protected] > 88FB D23C 5AC1 8756 5690 6661 A933 6E99 4E2C EF75 Penetration
Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
ICT Password Protection Policy
SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security
Deploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
How can I keep my account safe from hackers, scammers and spammers?
How can I keep my account safe from hackers, scammers and spammers? The question is a good one and especially important if you've purchased shared hosting (such as HostDime offers) since what effects your
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Visualizing Keyboard Pattern Passwords
Visualizing Keyboard Pattern Passwords Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy United States Air Force Academy ABSTRACT Passwords are a fundamental security vulnerability in many systems.
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007
White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)
Exam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
The City of New York
The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Adobe Systems Software Ireland Ltd
Adobe Systems Software Ireland Ltd Own motion investigation report 13/00007 Timothy Pilgrim, Australian Privacy Commissioner Contents Overview... 2 Background... 3 Relevant provisions of the Privacy Act...
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Do Strong Web Passwords Accomplish Anything?
Do Strong Web Passwords Accomplish Anything? Dinei FlorĂȘncio, Cormac Herley Microsoft Research One Microsoft Way Redmond, WA, USA [email protected], [email protected] Baris Coskun ECE Department Polytechnic
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Secure Remote Password (SRP) Authentication
Secure Remote Password (SRP) Authentication Tom Wu Stanford University [email protected] Authentication in General What you are Fingerprints, retinal scans, voiceprints What you have Token cards, smart
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Best Practices for Password Strength
A. Allan Research Note 6 December 2004 Passwords Are Near the Breaking Point Mitigating authentication weaknesses by increasing password length and complexity will reduce security if passwords are pushed
The Best of Both Worlds Sharing Mac Files on Windows Servers
The Best of Both Worlds Sharing Mac Files on Windows Servers March, 2008 1110 North Glebe Road Suite 450 Arlington, VA 22201 phone: 800.476.8781 or +1.703.528.1555 fax: +1.703.527.2567 or +1.703.528.3296
The True Story of Data-At-Rest Encryption & the Cloud
The True Story of Data-At-Rest Encryption & the Cloud by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800 500 3167 twitter.com/firehost
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
An Analysis of Markov Password Against. Brute Force Attack for Effective Web Applications
Applied Mathematical Sciences, Vol. 8, 2014, no. 117, 5823-5830 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.47579 An Analysis of Markov Password Against Brute Force Attack for Effective
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Securing Remote Desktop for Windows XP
Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain
Tufts University. COMP116 Introduction to Computer Security. Recovery After Losing the Physical Device
Tufts University COMP116 Introduction to Computer Security Recovery After Losing the Physical Device Dec. 11 th 2014 Author: Haoyang Mao Mentor: Ming Chow 1 Abstract The only truly secure system is one
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Pryvate App User Manual
Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
1. a. Define the properties of a one-way hash function. (6 marks)
1. a. Define the properties of a one-way hash function. (6 marks) A hash function h maps arbitrary length value x to fixed length value y such that: Hard to reverse. Given value y not feasible to find
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE
HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide
Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account
