Password Presentation Online
Password Presentation Online
Table of Contents
Why Passwords?
Weak Passwords
Strong Passwords
Attacking Passwords
Password management
Password tips
Self-test
References
Recent Major
Security Breaches
Lulz Security hacks Sony Pictures
website
Releases 50,00 users information
LulzSec
logo
Important!
Anything involving the internet is
inherently more risky then anything
not leaving your computer.
Passwords are the front line of defense.
Most peoples are not strong enough to
withstand a brute-force database
attack; today we are going to look at
how best to strengthen our passwords
Concern!
Its too easy to hack a password
For Example:
City Hall defaults to using clermont as the
password for any accounts made.
If this is left unchanged for too long the
security of the account would be
compromised.
This password only contains lowercase letters;
introducing a variety of characters, such as
Clermont, or, even better, CLeRmOnT,
increases the password strength considerably.
Is it possible
for passwords to be stolen if your computer is
infected with a virus or does not have a firewall?
ABSOLUTELY
Viruses can check your browsers saved
passwords, log keystrokes, or send your data
to places other then where you think you are
sending them.
Firewalls prevent people from accessing your
computer remotely, and using encrypted
internet access prevents data sniffing to
discover your information.
Quick Quiz
Which of the following best describes
the reason your password is easy to
remember:
A.
B.
C.
D.
E.
Characteristics of
weak passwords
Weak Passwords
based on common dictionary words
Including dictionary words that have been altered:
Common
mistakes in
creating
passwords
Risk Evaluation
of common mistakes
Mistake
Example
123456789
Using a Common Password. password
qwerty
Risk Evaluation
Too risky. These are most criminals first
guesses, so dont use them.
Gladiator
Bobby
Jenny
Scruffy
John12
Jim2345
Using one
password on every
site or online
service.
Writing your
password down on
a postit note stuck
to your monitor.
Bad Passwords!
Characteristics of strong
passwords
Strong Passwords
digit (0..9)
letter (a..Z) (Both lower and upper case)
punctuation symbol (e.g., !)
control character (e.g., ^s, Ctrl-s)
Mozillas Safe
Password Methodology
1. Pick up a familiar phrase or quote, for example, May the force be
with you and then abbreviate it by taking the first letter of each
word, so it becomes mtfbwy
2. Add some special characters on either sides of the word to make it
extra strong (like #mtfbwy!)
3. And then associate it with the website by adding a few characters
from the website name into the original password as either a suffix or
prefix. So the new password for Amazon could become #mtfbwy!
AmZ, #mtfbwy!FbK for Facebook and so on.
*While this technique lets us reuse the phrase-generated part of the
password on a number of different websites, it would still be a bad idea
to use it on a site like a bank account which contains high-value
information. Sites like that deserve their own password selection phrase.
http://rumkin.com/tools/password/passchk.php
https://www.microsoft.com/security/pc-security/password-c
hecker.aspx
http://www.grc.com/haystack.htm
http://howsecureismypassword.net/
Password Attacks
Most successful attacks are based
on:
Dictionary attacks
The guessing [often automated] of a
password by repeated trial and error.1
Social engineering
Social engineering is the process of using
social skills to convince people to reveal
access credentials or other valuable
information to the attacker.2
Factoid: passwords are inherently risky, because they are
susceptible to attack.5
Dictionary Attacks
Most hackers utilize widely available
password cracking dictionaries to
uncover weak passwords
Ways to reduce Your risk:
Create and use strong passwords
Social Engineering
Perhaps the most notorious social engineer
Kevin Mitnick once stated,
People are the weakest link. You can have the
best technology and somebody can call an
unsuspecting employee. Thats all she wrote.
They got everything.7
Factoid: [Studies] have shown that current password mechanisms have largely
failed to consider usability, and that given the increasing number of system and
passwords most users cannot cope with the demands imposed on them.4
Password overload
Many people use a few passwords for
all of their major accounts.
The average Web user maintains 25
separate accounts but uses just 6.5
passwords to protect them.
Password Security
More than
60%
of people
Password Management
1. Human memory is the safest database for storing all
your passwords
2. Writing passwords down on a piece of paper
3. Storing passwords on a computer in a Word
document or Excel file
4. Password Manager is software that allows you to
securely store all of your passwords and keep them
safe, typically using one master password. This kind
of software saves an encrypted password database,
which securely stores your passwords either on your
machine or on the Web.
You should not rely totally on any type of password manager
Your single master password must be unique and complex
Human Memory
Strength: safest database for storing all your
passwords
Weakness: Easy to forget
Writing on paper
Strength: ease of
access
Weaknesses:
You can lose the paper
Paper could be easily
stolen or viewed by
other people
Storing on computer
Strength: ease of access
Weaknesses:
Data is not encrypted, anyone who has
access to the computer that the file is
saved on can easily read your passwords
If your computer breaks, you could
possibly permanently lose the file
Password manager
Password Manager is software that allows you
to securely store all of your passwords and
keep them safe, typically using one master
password. This kind of software saves an
encrypted password database, which securely
stores your passwords either on your machine
or on the Web.
You should not rely totally on any type of password
manager
Your single master password must be unique and
complex
Disadvantage: If you forget the master password, all your other passwords
in the database are lost forever, and there is no way of recovering them.
Dont forget that password!
KeePass
KeePassis a popular open-source, cross-platform, desktop-based
password manager. It is available for Windows, Linux and Mac OS X
as well as mobile operating systems like iOS and Android. It stores
all your passwords in a single database (or a single file) that is
protected and locked with one master key. The KeePass database is
mainly one single file which can be easily transferred to (or stored
on) any computer. Go to the download pageto get your copy.
KeePass is a local program, but you can make it cloud-based by
syncing the database file using Dropbox, or another service like it.
Check out Justin Pots article,
Achieve Encrypted Cross-Platform Password Syncing With KeePass
&
Dropbox.
Make sure you always hit save after making a new entry to the
database!
Password Safe
Many computer users today have to keep track
of dozens of passwords: for network accounts,
online services, premium web sites.8
With Password Safe, a free Windows 9x/2000
utility from Counterpane Labs, users can keep
their passwords securely encrypted on their
computers. A single Safe Combination--just one
thing to remember--unlocks them all.8
Password Safe features a simple, intuitive
interface that lets users set up their password
database in minutes.8
Best of all, Password Safe is completely free: no
license requirements, shareware fees, or other
strings attached.8
You can learn more about this product by visiting
Auction Fraud
Counterfeit Cashier's Check
Credit Card Fraud
Debt Elimination
DHL/UPS
Employment/Business Opportunities
Escrow Services Fraud
Identity Theft
Internet Extortion
Investment Fraud
Lotteries
Nigerian Letter or "419"
Phishing/Spoofing
Ponzi/Pyramid
Reshipping
Spam
Third Party Receiver of Funds
Debt Elimination
Know who you are doing business with
do your research.
Obtain the name, address, and telephone
number of the individual or company.
Research the individual or company to
ensure they are authentic.
Contact the Better Business Bureau to
determine the legitimacy of the company.
Be cautious when dealing with individuals
outside of your own country.
Ensure you understand all terms and
conditions of any agreement.
Be wary of businesses that operate from
P.O. boxes or maildrops.
Ask for names of other customers of the
individual or company and contact them.
If it sounds too good to be true, it probably
is.
Employment/Business Opportunities
Be wary of inflated claims of product
effectiveness.
Be cautious of exaggerated claims of
possible earnings or profits.
Beware when money is required up front for
instructions or products.
Be leery when the job posting claims "no
experience necessary".
Do not give your social security number
when first interacting with your prospective
employer.
Be cautious when dealing with individuals
outside of your own country.
Be wary when replying to unsolicited emails
for work-at-home employment.
Research the company to ensure they are
authentic.
Contact the Better Business Bureau to
determine the legitimacy of the company.
Identity Theft
Ensure websites are secure prior to submitting
your credit card number.
Do your homework to ensure the business or
website is legitimate.
Attempt to obtain a physical address, rather
than a P.O. box or maildrop.
Never throw away credit card or bank
statements in usable form.
Be aware of missed bills which could indicate
your account has been taken over.
Be cautious of scams requiring you to provide
your personal information.
Never give your credit card number over the
phone unless you make the call.
Monitor your credit statements monthly for any
fraudulent activity.
Report unauthorized transactions to your bank
or credit card company as soon as possible.
Review a copy of your credit report at least
once a year.
Investment Fraud
If the "opportunity" appears too good to be
true, it probably is.
Beware of promises to make fast profits.
Do not invest in anything unless you
understand the deal.
Don't assume a company is legitimate based
on "appearance" of the website.
Be leery when responding to invesment
offers received through unsolicited email.
Be wary of investments that offer high
returns at little or no risk.
Independently verify the terms of any
investment that you intend to make.
Research the parties involved and the nature
of the investment.
Be cautious when dealing with individuals
outside of your own country.
Contact the Better Business Bureau to
determine the legitimacy of the company.
Ponzi/Pyramid
If the "opportunity" appears too
good to be true, it probably is.
Beware of promises to make fast
profits.
Exercise diligence in selecting
investments.
Be vigilant in researching with whom
you choose to invest.
Make sure you fully understand the
investment prior to investing.
Be wary when you are required to
bring in subsequent investors.
Independently verify the legitimacy
of any investment.
Beware of references given by the
promoter.
Spam
Don't open spam. Delete it unread.
Never respond to spam as this will confirm to
the sender that it is a "live" email address.
Have a primary and secondary email address one for people you know and one for all other
purposes.
Avoid giving out your email address unless you
know how it will be used.
Never purchase anything advertised through
an unsolicited email.
Third Party Receiver of Funds
Do not agree to accept and wire payments for
auctions that you did not post.
Be leery if the individual states that his country
makes receiving these type of funds difficult.
Be cautious when the job posting claims "no
experience necessary".
Be cautious when dealing with individuals
outside of your own country.
Self-Test
Remember, better understanding leads to better
protection of
our Password
our Identity
our Privacy
Question 1
Strong passwords and password practices
contribute to protection of identity and
privacy.
A. TRUE
B. FALSE
(choose/click one)
Correct!
Excellent,
strong passwords and password
practices do contribute to protection
of identity and privacy
Now lets move onto the next question
Question 2
Which pair contains both a weak and a
strong password?
A. cs101ra, ME11111
B. WYSIWYG, passwd
C. ig*hh4, f9%Wfh
D. kirk, on$7mur
(choose/click one)
Correct!
Excellent,
A. cs101ra, ME11111
(weak, common), (weak, license #)
B. WYSIWYG, passwd
(weak, common acronym), (weak, common)
C. ig*hh4, f9%Wfh
(strong), (strong)
D. kirk, on$7mur
(weak, common name), (strong)
Question 3
What is the role of passwords in
authentication?
Correct!
Excellent,
the role of passwords in authentication is
B. to verify you are the legitimate
owner of the user/account identifier
Now lets move onto the next question
Question 4
Which of the following best describes the
relationship between authentication and
both identity and privacy?
A. Successful authentication validates identity and
provides access to private information
B. Authentication is the validation of a users identity
C. Anyone who authenticates themselves on a system
using your credentials (user/account identifier,
password) assumes your identity and has access to
your personal information on that system
D. Identity theft and invasion of privacy are likely results
of weak passwords and/or password practices
(choose/click one)
Correct!
Excellent,
A. Successful authentication validates
identity and provides access to private
information
Note, the other choices are either simple definitions or facts
regarding the conditions or probable outcomes of fraudulent
authentication (likely attributable to password theft)
Question 5
This is a tool helpful to those who have
many passwords to remember.
A. KeePass 2
B. Password Safe
C. Sphinx
D. TK8 Safe
(choose/click one)
Correct!
Excellent,
(actually, these are all tools helpful to those who have many
passwords to remember)
KeePass 2, learn more by visiting
http://keepass.info/
Password Safe, learn more by visiting
http://www.passwordsafe.com/
Sphinx (a hardware solution), learn more by visiting
http://www.securetech-corp.com/sphinx.html
TK8 Safe, learn more by visiting
http://www.tk8.com/safe.asp
Congratulations, you have answered all questions correctly
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
Matt Bishop (2003) Computer Security. Pearson Education, Inc. ISBN: 0-20144099-7.
Michael Whitman & Herbert Mattord (2003) Principles of Information Security.
Course Technology, a division of Thomson Learning, Inc. ISBN: 0-619-06318-1.
Benny Pinkas & Tomas Sander (2002) Authentication and authorization: Securing
passwords against dictionary attacks. Proceedings of the 9th ACM conference on
Computer and communications security.
Dirk Weirich & Martina Angela Sasse (2001) Session 7: passwords revisited: Pretty
good persuasion: a first step towards effective password security in the real world.
Proceedings of the 2001 workshop on New security paradigms.
Peter G. Neumann (1994) Risks of passwords. Communications of the ACM,
Volume 37 Issue 4.
Anne Adams & Martina Angela Sasse (1999) Users are not the enemy.
Communications of the ACM, Volume 42 Issue 12.
Elinor Abreu (2000). Kevin Mitnick bares all. NetworkWorldFusion News Online (28
September 2000) [ Cited July 26, 2003 ] available from the World Wide Web
http://www.nwfusion.com/news/2000/0928mitnick.html
Counterpane Internet Security (2003). Password Safe software. [ Cited July 26,
2003 ] available from the World Wide Web
http://www.counterpane.com/passsafe.html
United States Department of Defense Computer Security Center (1985).
Department of Defense Password Management Guideline. CSC-STD-002-85 Library
No. S-226,994 [ Cited July 26, 2003 ] available from the World Wide Web
http://www.radium.ncsc.mil/tpep/library/rainbow/CSC-STD-002-85.html
More References
Al-Marhoon, M. (n.d.). Password Management Guide.
MakeUseOf. Retrieved April 10, 2013, from http://
www.makeuseof.com/pages/the-password-managemen
t-guide-fulltext
http://
www.slideshare.net/NortonOnline/2012-norton-cybe
rcrime-report-14207489
http://www.ic3.gov/media/annualreports.aspx
WWW Resources
http://web.mit.edu/net-security/www/pw.html
http://www.umich.edu/~policies/pw-security.html
http://www-cgi.cs.cmu.edu/~help/security/pass_sec.html
http://www.alw.nih.gov/Security/Docs/passwd.html
http://www.ucsc.edu/banner/01ePwdSecurity.html#Passwor
d%20Guidelines
http://ithelp.indstate.edu/info/secure-passwords.html#gener
al
http://www.lbl.gov/ITSD/Security/guidelines/password.html
#choose
http://tigger.cc.uic.edu/~mbird/password.html
http://psynch.com/docs/best_practices.html
http://www.p-synch.com/docs/strength.html
Incorrect
Perhaps a review may help, please select
one of the following:
Weak passwords practices
Strong passwords practices
Password attacks
Passwords in the Context of Your Identity and Privacy
Password Facts worth Remembering
Back to Test
Thank you.