You are here: IT-Observer È Articles È Information Security RSS | White Papers | ÊÊ

How to use passwords securely





Passwords have become, without doubt, users’ ID cards in the Internet. Thanks to passwords, you can prove who you are and unauthorized access can be blocked. However, by the same token, should a malicious user steal or discover this data, they can take on your digital identity.

The most widely used attacks to find out passwords in authentication systems are 'dictionary' or 'brute force' attacks. In order to have any chance of success, the attacker must know the user name of the account, which is not as difficult as it sounds, as many people leave default passwords unchanged (such as root, administrator or admin).

Dictionary attacks involve, once a correct user name is obtained, trying out a series of passwords from a set list to see if they match. This kind of operation is often carried out using a purpose-built application, with a dictionary as the source of the passwords to try, as many users simply use common words as passwords.

A brute force attack is similar to the one mentioned above, although instead of using a set list, it uses all possible combinations of characters. This kind of attack is most effective with short passwords, as the number of combinations needed is obviously related to the length of the password.

Many of these attacks are aimed at accounts with maximum privileges, exploiting the fact that a system has a default user name. In Windows platforms for example, the "administrator" user account is a frequent target. One sound security tip is to change the user name of this account for one less well known or less obvious. Similarly, you can leave a decoy account with the name "administrator" with minimal privileges and a complicated password. This means that the real administrator account will be protected and you will also be able to detect when there is an intrusion attempt, using the auditing options on Windows accounts that will inform you about failed authentication attempts.

How to create and use secure passwords

One of the basic rules for choosing a password is to ensure it is both long and complex in terms of characters. As a rule of thumb, a good password is a least eight characters long and combines letters, numbers and special symbols (example: "ke8_JW.@").

Although creating a good password is not difficult, with so many services requiring password authentication, remembering them can be a problem, especially as the objective is to avoid having a series of numbers and letters that are easy to guess or remember.

To prevent having to remember a variety of different complex passwords, many users have same password for different applications, services, etc. Unfortunately, this increases the risk of an attacker stealing users' digital identities, as the password could be stored in applications and potentially accessible to others. If you use the same password for using your computer, accessing web mail and electronic banking, an attacker who cracked one of the passwords would be able to read your mail and make transactions under your name. For this reason, it is important to use different passwords, especially when it comes to services with confidential information (such as online banking services), and only use simple passwords for less important services (for example subscription to online newspapers, etc.).

However, there are also other means of authentication, including digital certificates. The best known of these are those used on secure web servers -such as electronic banking- and are used to establish encrypted connections through the HTTPS protocol. Digital certificates for clients are similar but, in this case, they can be used to verify the identity of the user, adding an additional security layer to systems based exclusively on passwords.

Several banks are already issuing digital certificates to clients. They provide them with a certificate which can be installed on their PC, preventing an attacker from accessing from another computer, even if they have stolen the user’s password. For users that don't always connect from the same PC, digital certificates can be issued in USB keys, the size of a normal key- which can be used on any computer.



Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

Ê

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

Ê

GFI LANguard N.S.S. NEW v8 out now!
Complete network vulnerability management, providing powerful vulnerability scanning, patch management and auditing solution. DOWNLOAD A 30-DAY TRIAL TODAY!

Ê

Latest News

eEye released integer overflow auditing tool
16.02.07ÊÊVulnerability research company eEye Security has released a free security vulnerability auditing tool that helps spotting possible integer overflow vulnerabilities.

AES Password Manager 2.3 released
16.02.07ÊÊAES software has announced the availability of AES Password Manager 2,3, the latest version of their password management application that allows users automatically access password-protected web sites and email accounts.

IBM safeguards against Microsoft vulnerabilities
16.02.07ÊÊIBM’s security division, Internet Security Systems, offers protection from several critical vulnerabilities announced by Microsoft.

Firefox cookie-stealing vulnerability
15.02.07ÊÊA new zero-day vulnerability in Mozilla Firefox allows malicious web sites to forge authentication cookies for certain web sites.

Valentine’s Day: a powerful lure for spreading malware
09.02.07ÊÊAs Valentine´s Day approaches, users should keep a wary eye on any romantic messages received by email, as many of them could contain malicious code.

Skype reads out your BIOS data
09.02.07ÊÊThe Windows version of the Voice-over-IP software Skype reads and stores the BIOS and motherboard serial number of a user’s computer.

Utimaco SafeGuard Enterprise supports BitLocker
09.02.07ÊÊUtimaco has announced that its SafeGuard Enterprise now supports Windows Vista BitLocker drive encryption.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us ÊÊ
Site Meter