[iwar] [fc:Password.Protection.101]

From: Fred Cohen (fc@all.net)
Date: 2001-10-31 22:15:08


Return-Path: <sentto-279987-3724-1004595296-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 31 Oct 2001 22:16:08 -0800 (PST)
Received: (qmail 3959 invoked by uid 510); 1 Nov 2001 06:14:10 -0000
Received: from n8.groups.yahoo.com (216.115.96.58) by 204.181.12.215 with SMTP; 1 Nov 2001 06:14:10 -0000
X-eGroups-Return: sentto-279987-3724-1004595296-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.54] by n8.groups.yahoo.com with NNFMP; 01 Nov 2001 06:14:56 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 1 Nov 2001 06:14:56 -0000
Received: (qmail 5953 invoked from network); 1 Nov 2001 06:14:56 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 1 Nov 2001 06:14:56 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 1 Nov 2001 06:14:56 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA16F8H12414 for iwar@onelist.com; Wed, 31 Oct 2001 22:15:08 -0800
Message-Id: <200111010615.fA16F8H12414@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 31 Oct 2001 22:15:08 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Password.Protection.101]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Password Protection 101

NIPC, 10/31/2001
<a href="http://www.nipc.gov/publications/nipcpub/password.htm">http://www.nipc.gov/publications/nipcpub/password.htm>

Every year thousands of computers are illegally accessed because of weak
passwords. How many users are guilty of any of the following things:

Writing down a password on a sticky note placed on or near your
computer.  Using a word found in a dictionary. That's right, a
dictionary. Any dictionary!  Using a word from a dictionary followed by
2 numbers.  Using the names of people, places, pets, or other common
items.  Sharing your password with someone else.  Using the same
password for more than one account, and for an extended period of time. Using the 
default password provided by the vendor. 
Chances are, if you are anything like the majority of computer users,
you answered yes to one or more of the above questions. The problem is,
hackers are aware of these problems as well and target those who don't
take the correct precautions. 
Why Is There A Problem? 
Passwords are one of the first lines of defense that users have to
protect their systems. Unfortunately, people are not accustomed to
remembering difficult passwords consisting of numbers and weird
characters. The ever-increasing number of passwords required to work in
today's world only makes this problem worse. Many people have
compensated for this problem by writing down their password and keeping
that information in an unsecured area, like stuck to a computer screen. 
One of the first things a hacker will attempt to do against a system is
run a program that will attempt to guess the correct password of the
target machine. These programs can contain entire dictionaries from
several different languages. In addition to words found in dictionaries,
these programs often contain words from popular culture such as science
fiction movies and novels. 
Hackers like to attack people's weaknesses. One of the major weaknesses
is the reluctance to remember several, long, difficult to guess words
such as passwords. Therefore, once one is chosen, the likelihood that
the same password is used for several accounts is very high. This is
similar to the problem with default passwords because users have a
tendency to keep the same password for a long period of time, thereby
allowing the attacker that much more time to gain access to a system. 
What You Can Do? 
Remembering long passwords can be difficult, but there are some basic
techniques users can employ to lessen the pain. First, choose a phrase
that you will remember. As an example, we will use the phrase "The pearl
in the river." You can then take a number that you are familiar with,
such as a birthday. For this example we will use 7/4/01. Next, you can
take the first letter of your phrase and interlace it with the chosen
date to make something similar to t7p4i0t1r. This method creates a
password that won't be found in any dictionary and is unique to the
person who created it. 
t p i t r =t7p4i0t1r 7 4 0 1

It is important to remember though, that any password can be guessed if
given enough time. Therefore, it is important to change your password
within the amount of time it would take an attacker to guess it. For
example, with the previous password it may take an attacker 60 days on a
very fast computer to guess what it is. In order to ensure your systems
safety then, a user must change their password before those 60 days come
to an end. 
While password security is a very important deterrent to hackers gaining
access to your system, it is only one component to the "defense in
depth" principle. What this means, is passwords need to be used along
with other measures such as updated anti-virus software and a personal
firewall such as Zone Alarm. This is the first in a continuing series of
articles that will help explain the importance of safe computing in
today's networked world. If you have any questions on the above article
please contact the watch at nipc.watch@fbi.gov. Additionally, please
visit the following web sites for more information on the importance of
strong passwords along with many other computer security matters.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST