Gone are the days of using your goldfish's name as a password. The spiraling power of computers makes strong passwords...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
How does a computer make sure end users aren't setting their passwords to "password"? An informative password policy will aid this effort. Factors that go into a password policy include length, types of characters to be used, frequency they are changed and who has access to them.
Attackers use a variety of methods to get passwords to a system. One way is targeting specific people and learning their personal information. Things like birthdays, anniversaries and mother's maiden names can be found fairly easily.
Yet no matter how complex passwords are, they are useless if they are tucked under a keyboard or mouse pad. Keeping them stored in a text file is also potentially dangerous. They should be encrypted if stored passwords on a computer.
There are also automated attacks. Dictionary attacks literally tries every word from a list. These attacks can also include tacking on characters at the beginning or end of words, like when people combine their nickname with their birthday.
Even random selection of letters can be figured out by a brute force attack that tries every combination. One can crack a random password composed of just letters in 24 hours easily, said Rob Cheyne, managing security architect at @stake. Add numbers to the mix and it may take up to five days.
But adding symbols expands the total number of combinations enough to make a password fairly strong. Creating a password with a random mixture of symbols, letters and numbers is the best course, Cheyne said.
Now even random passwords can be guessed. This is where password length comes into play. Longer passwords will make such an attack harder and could discourage attempts. "Attackers look for low hanging fruit. They want to get the password in 10 minutes and get the information they want," Cheyne said.
A password with five or less characters could be found quite quickly by a brute force attack. Passwords with seven or more characters are more secure, Cheyne said.
Changing passwords is another way to combat brute force attacks. Someone hell bent on cracking your password may need a few months to try all the combinations. Changing passwords every 60 or 90 days could foil such attempts. However, changing passwords too often isn't advisable as user confusion could tax IT resources as they constantly forget their passwords, Cheyne said.
Additionally, creating long, non real word passwords that people can't remember is also a problem. A trick is using mnemonics or a phrase to remember the password. Again, remember back to high school when one learned "King Phillip came over for good sex" to remember the order of taxonomy in biology (kingdoms, phylum, classes, orders, families, genus and species).
For passwords, a way is coming up with a mantra-like phrase like "I like carrots!"or "il
Companies can ease some of the risks associated with random attacks by setting up systems to close when a few attempts fail. Additionally, systems that face the Internet shouldn't say if a username or password is wrong. A generic "login has failed" message should be displayed.
Sometimes companies need help with enforcing such policies. Software tools allow users to reset their own passwords if forgotten. Such tools save IT the work of resetting passwords.
Additionally, software can scan the prospective password to make sure it isn't the person's name or address. Other apps look for dictionary names (often from several languages).
Balancing sound security with the convenience is a challenge. "However, it is a cost of securing business," said Andrew Moffat, CEO of Ottawa-based EDUCOM TS Inc.