0% found this document useful (0 votes)
45 views8 pages

Midterm Exam BasnetKaushal

The document provides recommendations for creating strong and secure passwords. It advises using long, random passwords with a mix of uppercase letters, lowercase letters, numbers, and symbols. It also recommends using unique passwords for each account and storing passwords securely using a password manager. Finally, it suggests enabling multi-factor authentication when available for added security.

Uploaded by

kaushalbasnet988
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views8 pages

Midterm Exam BasnetKaushal

The document provides recommendations for creating strong and secure passwords. It advises using long, random passwords with a mix of uppercase letters, lowercase letters, numbers, and symbols. It also recommends using unique passwords for each account and storing passwords securely using a password manager. Finally, it suggests enabling multi-factor authentication when available for added security.

Uploaded by

kaushalbasnet988
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

2023

Password Policy Recommendations


[Document subtitle]
Kaushal basnet
Password Policies

Introduction

The security and privacy of electronically stored data requires that access to that data is

controlled. A username and password combination continues to be the most common form of

access control. While more secure alternatives for authentication and authorization are available,

passwords are easy to use and cost-effective to implement. Unfortunately, attackers know

recognize that users have limitations when choosing passwords and that those limitations

introduce vulnerabilities that they can take advantage of to gain illicit access.

In this paper, common poor practices and well-known vulnerabilities created by those

practices are reviewed first. Next, the consequences of such vulnerabilities are described. Then a

series of recommendations for password use are presented in a form that is easily understood by

end-users. Finally, additional challenges are considered and a conclusion is offered.

Poor Password Practices and Their Consequences (Storm, 2016)

Choosing a poor password has a number of potentially devastating outcomes for the

security and privacy of your personal information. Users will frequently choose passwords that

are short and easy to remember. A list of the most common passwords includes 123456,

password, letmein, opensesame and other well-known passwordschoices.

Passwords that are short or common are not only easily guessed by a human attacker, but

are even more easily broken by automated tools used employed by hackers. These tools are built

to recover passwords using a variety of techniques, including dictionary searches, brute force,

and rainbow tables. Passwords that are eight or fewer characters and contain no variations such

as uppercase, digits or symbols, are cracked in a matter of seconds by ordinary computer

hardware.
Another bad habit is reusing passwords. If you have created a strong password but have

reused it across multiple systems, your data are at risk. This is a result of the fact that your

password for a specific system is not only under your control, it’s also under the control of the

system operator. A password can be considered a “shared secret.” Therefore, you implicitly rely

on the system operator to take care to safeguard your password. Experience has shown that many

systems handle passwords insecurely and it has led to massive caches of usernames and

passwords published online. The availability of such lists provides opportunities for attackers to

try to access systems whose operators protect passwords properly but are left vulnerable due to

the disclosure of passwords from other systems.

Recommended Password Practices (Schneier, 2014)

The first line of defense is creating long, strong, and seemingly random passwords.

Passwords should never be shorter than eight characters, but longer is always better. Always

include a mix of lowercase letters, uppercase letters, digits, and symbols and have them in

random places. For example, the uppercase letter should not just be the first character and the

symbol should not just be tacked onadded to the end.

Equally important is the practice of “one system, one password.” For every user account

on every system, you should have a unique password. This means that if you have user accounts

on e-mail systems, banking web sites and online shopping sites, you will have as many different

passwords than you do accounts.

Having so many complex passwords to create and track will soon become overwhelming,

so the passwords and other details about the systems will inevitably need to be stored recorded

somewhere. Writing down passwords on paper or storing them in a traditional computer file

opens different avenues for abuse. To securely store passwords and other secrets, use a software
application called a password manager. In its most basic form, a password manager is a tool used

to create and protect a database of usernames and passwords and information about the system

they apply to, such as the URL of a web site.

Password managers are available in two broad categories: online and offline. Online

password managers keep your database on Internet-connected servers operated by the maker of

the password manager. Offline password managers save the password database on your

computer. Online password managers have the advantage of providing access to your password

on different devices, though those systems may themselves be targets of attackers. If you use an

offline password, you can use other tools to transfer and synchronize your password database

between different devices.

Many passwords managers add user-friendly features, such as mobile applications,

browser plug-ins to allow automatic form filling, and the ability to remind you when a password

is getting stale, for example when it hasn’t been changed in a long time. Some of these features

come at a premium price, but a password manager does not have to cost a lot to be good. Some

highly regarded offline password managers are even free.

For some purposes, relying solely on a password manager may not be feasible. This

applies to the master password that protects your password database and also to passwords you

may need to enter frequently, such as your computer login password. To create strong passwords

for those uses, think “passphrase” instead of password. Begin by thinking of a favorite phrase,

such as a movie line, song lyric, or quote. You can then choose to obfuscate this phrase by

substituting regular characters for symbols or digits, removing vowels, or adding punctuation

characters.
The final recommended password practice is to keep your password secure and private at

all times. You should never share your password, not even with trusted individuals. After all, you

may trust them, but they may not practice safe passwords habits like you do. If you ever suspect

that a password has been compromised, immediately change it and review your information on

the affected system for any unauthorized changes.

Additional Challenges

No matter how conscientiously you protect your password and avoid re-use, there are

times when passwords are compromised. For example, even the savviest Internet users can fall

victim to phishing. Some of the recommended practices above can limit the negative impact of

being phished, but some damage will be done. Security-minded system operators offer users an

additional way to authenticate. This is referred to as two-factor or multi-factor authentication.

Examples include sending a text message with a one-time code or asking for a constantly

changing number that is generated by a smartphone app.

Attackers can bypass password security altogether by abusing self-service password reset

provisions. Often, these provisions require providing answers to questions that only the

legitimate user should know. Yet, the answers are often found online as part of social media

profiles or are easily guessed. Attackers will not attempt to guess a password if it’s much easier

to guess the reset answers. When required to provide one or more such answers, the best

approach is to create random answers and store this in the password manager with the other

information about that system.

Conclusion

Users must be aware that the passwords they create are keys to private information. Short

or common passwords are easily recovered by automated tools. Password reuse can compromise
different systems accessed by the same user. Information security can be enhanced significantly

by creating random passwords using reputable password managers, which bring implementing

the recommended best practices within reach of everyone.

Users should opt-in to use multi-factor authentication whenever offered by systems. The

use of a second, independent authentication mechanism makes the password less sensitive and

therefore less desirable for attackers.


References

Schneier, B. (2014, March 2). Choosing Secure Passwords. Retrieved from Schniers of Security:

https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html

Storm, D. (2016, January 20). ComputerWorld. Retrieved from

http://www.computerworld.com/article/3024404

You might also like