<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password strength – fiction, fact, or what should secure your environment? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/3230#M331</link>
    <description>&lt;P&gt;I think the battle is to try and walk the familiar line between ease of use versus security. I agree the overly complicated NIST requirements and the horrible password practices that it spawned were actually detrimental to good password practices. It has to be at least 14 characters long, 1 from each group, no character repeated more than twice in a row, not a common dictionary word or a L33T version of said words, AND don't write it down. Oh yeah, have another one ready to go in 90 days because we are going to make you change it and it can't be any of the last 10 really difficult but easy to remember passwords that you came up with.&lt;/P&gt;&lt;P&gt;I write my passwords down in a big book. WHAT? You say?&lt;/P&gt;&lt;P&gt;I reuse passwords? Again you may be shaking your head saying that I am violating all of the "good" password rules we learned while preparing for the CISSP. But here's my catch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you got a hold of my book you would not be able to log in with any of them without cracking my code. Basically it is more of a password hint book. When I reuse my passwords I do it because I group like minded accounts together. i.e. all of my learning/training accounts use the same password so if you were able to crack my code you would only gain access to my learning accounts. And the passwords for my financial accounts are way different (and I do not reuse a password for the important accounts or vary them enough that you would lock them out before guessing). Each email address has a different password. My password reset requests are sent to my phone and a back up email address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have got to find ways to help people come up with more secure methods for using passwords while at the same time making it easier for them. I like the example showing how using a simple phrase can make it harder for the attackers to crack but easier for the user to remember.&amp;nbsp;I am a big believer in using Hidden in plain sight passwords. Got a favorite phrase on a sign in your office? "Those Who Do Not Remember History Are Doomed To Repeat It. - Albert Einstein. 1947." = TWDNRHADTRI-ae1947 that would be pretty hard for a machine to crack but right where the person using the computer could see it or remember it.&amp;nbsp; (And please do not assume that that was a correct quote and attributed to the correct person and timeframe, I just made it up to provide an example.) Teach the users how to make it simpler and easier for them. Also educate on how a hacker would compromise their accounts. Go through the process they would use. Show them the vulnerable points in their thought process around passwords. Show them how answering a seemingly innocent quiz/survey on Facebook of "what kind of Princess are you?" could be getting them to disclose the answers to the security questions on their verification process for password resets. (i.e. what is your favorite color?, etc)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The answer lies in education. If you are not involved in your new employee education process at work, get involved. Ensure what the new employees are given is timely and useful. If you hear misinformation being given out at family gatherings, speak up and educate them.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2017 15:21:01 GMT</pubDate>
    <dc:creator>CISOScott</dc:creator>
    <dc:date>2017-11-02T15:21:01Z</dc:date>
    <item>
      <title>Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1053#M94</link>
      <description>&lt;P&gt;&lt;STRONG&gt;The trouble with passwords…&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trouble... We’re not talking about the yellow sticky-notes on the side of monitors or employees sharing passwords.&amp;nbsp;Password composition is at issue.&amp;nbsp;Passwords used today are generally the same as what we were using 20 years ago.&amp;nbsp;This might be acceptable if all other variables within Information Technology have remained the same since then.&amp;nbsp;They haven’t.&amp;nbsp;Those who have not adapted may have placed their IT assets at considerable risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Will my password effectively secure everything?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Twenty years ago, probably.&amp;nbsp;&amp;nbsp;Remember the old IBM auto-password generators that gave us hard to remember passwords with the mix of alpha/numeric and special characters that were 8 characters long?&amp;nbsp;That is because that is the number of spaces the operating systems and applications would recognize for passwords.&amp;nbsp;The mix of characters from the password generators might give us something like this:&amp;nbsp;n&amp;amp;}P2^XJ&amp;nbsp;…pretty easy to remember, right?&amp;nbsp;It must be secure because it looks so complex!&amp;nbsp;Not true either.&amp;nbsp;Today’s password cracking arrays make quick work of this password.&amp;nbsp;A couple of minutes to be exact.&amp;nbsp;And, this is where it really goes fast!&amp;nbsp;In 2012, &lt;A href="https://arstechnica.com/information-technology/2012/12/25-gpu-cluster-cracks-every-standard-windows-password-in-6-hours/" target="_blank"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;ARS Technica&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt; reported that a 25-GPU cluster could crack every possible combination of 8-character passwords in under 6 hours.&amp;nbsp;Again, that was using 2012 technology.&amp;nbsp;What about today?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Still feeling secure with your enterprise password policy?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Justifiably so, you are possibly starting to break a sweat while digesting this habanero of a topic.&lt;/P&gt;&lt;P&gt;Today, we understand much more about strong passwords than we did in the past.&amp;nbsp;NIST has modified their guidelines for password deployment, which we’ll discuss further shortly.&amp;nbsp;What defines a strong password?&amp;nbsp;Is it upper-case, lower-case, numbers, special characters?&amp;nbsp;This is what we’ve been taught.&amp;nbsp;The answer in the past has been yes to all of the above.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To understand what delivers a strong password, we must know what drives password cracking.&amp;nbsp;The two predominant forces are tables/dictionaries of common passwords, and brute force.&amp;nbsp;Tables and dictionaries provide long lists of commonly used or suspected passwords.&amp;nbsp;The crackers can check your password against entries in the tables at light-speed.&amp;nbsp;Brute force involves guessing each character in your password, and takes a little more time due to the number of variables (upper/lower case, numeric, special characters) to run through.&amp;nbsp;But, remember, all possible 8-character combinations are cracked in less than 6 hours…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What is a strong password?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Entropy&lt;/EM&gt; and &lt;EM&gt;Search Space&lt;/EM&gt; come into play.&amp;nbsp;What is Entropy?&amp;nbsp;Well, think of our complex, hard to remember, but easy to crack password from earlier: "n&amp;amp;}P2^XJ".&amp;nbsp;&amp;nbsp;Entropy relies on excessive complexity to be “unpredictable,” in theory.&amp;nbsp;But, we saw that our example password could be cracked in a couple of minutes.&amp;nbsp;Is Entropy still delivering strong passwords?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Search Space factors in the length of the password in terms of total characters and the number of possible variables included in the password (upper/lower case, numeric, special characters) to determine what the &lt;EM&gt;total number of possible passwords&lt;/EM&gt; can be derived from that combination.&amp;nbsp;In simple terms, the &lt;U&gt;“length”&lt;/U&gt; of the password in terms of characters is most important, with some complexity added.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let’s look at the statistics in this table:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;PASSWORD&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;PASSWORD CHARACTERS&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;SEARCH SPACE = POSSIBLE PASSWORD COMBINATIONS&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;EASY TO REMEMBER&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;EASY TO CRACK&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;TIME TO CRACK&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;n&amp;amp;}P2^XJ&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;8&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;6,704,780,954,517,120&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;NO&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;YES&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;1.12 minutes&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;Thisisagreatpassword!&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;21&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;33,337,810,962,573,359,664,680,352,920,577,639,625,185&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;YES&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;NO&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;1.06 hundred thousand trillion centuries&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While “Thisisagreatpassword!” takes a large amount of theoretical time for advanced cracking systems to solve it, does that make it a strong password?&amp;nbsp;Yes and no.&amp;nbsp;Statistics is a funny thing.&amp;nbsp;Have you heard of anyone &lt;A href="http://nypost.com/2016/01/16/florida-teen-first-time-player-wins-2m-powerball/" target="_blank"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;winning the lottery on their first try&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;?&amp;nbsp;It does happen.&amp;nbsp;Likewise, depending upon how password crackers have their search or brute force mechanisms structured, they too could hit your password on the first try.&amp;nbsp;The point is to make it as difficult as possible for the password crackers to ever crack your password.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Back to NIST…&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;NIST&lt;/FONT&gt;&lt;/U&gt; has revised their password guidelines as they do periodically.&amp;nbsp;Currently, they still suggest 8-characters with complexity as the &lt;EM&gt;bare minimum &lt;/EM&gt;for a password.&amp;nbsp;Should that be your enterprise password policy?&amp;nbsp;Probably not, unless the variables affecting your Information Technology environment are the same as 20 years ago, or you can afford to lose control of your data or afford regulatory fines for those losses.&amp;nbsp;The rest of us want a more secure password policy.&amp;nbsp;This is also where NIST steps in.&amp;nbsp;As a maximum, NISTS’s revised guidelines recommend 64 characters for your policy with some complexity.&amp;nbsp;Why?&amp;nbsp;Because they realize the value of a long password in protecting your IT assets from credential exposure via password cracking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Are Password credentials&amp;nbsp;enough to protect your assets?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;Passwords are not enough to provide secure authentication.&amp;nbsp;Once again, things are not as they were 20 years ago.&amp;nbsp;Our practices shouldn’t be either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Multifactor Authentication should be used to enhance strong passwords.&amp;nbsp;Multifactor is something you are: biometrics, something you know: password/PIN, something you have: FOB or card (magnetic strip or RFID).&lt;/P&gt;&lt;P&gt;Sure, MFA equates to more cost, administration, user training, etc..&amp;nbsp;But, can you afford to lose control over your data (PHI, PII, Financial, etc)&amp;nbsp;Where are things going in the next 20 years?&amp;nbsp;Quantum computing for example?&amp;nbsp;Now how long will it take to crack a strong password?&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Use MFA, with a strong password/passphrase of at least 14 characters with some complexity.&amp;nbsp;Defense in-depth, layer your security.&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Credit to&lt;/U&gt;:&amp;nbsp;&amp;nbsp;ARSTechnica.com,&amp;nbsp;NYPost.com,&amp;nbsp;NIST.gov&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.linkedin.com/in/brianrkunick/" target="_blank"&gt;&lt;STRONG&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;Brian R. Kunick&lt;/FONT&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;, &lt;/STRONG&gt;is a CIO/CSO servicing the operational and security requirements of the enterprise.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:18:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1053#M94</guid>
      <dc:creator>BrianKunick</dc:creator>
      <dc:date>2023-10-09T08:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1060#M96</link>
      <description>&lt;P&gt;Great read,&amp;nbsp; I agree that passwords are simply not enough to protect your systems.&amp;nbsp;&amp;nbsp;I work heavily in the UNIX/Linux space and am currently discussing why a password vaulting technology is a BAD idea to secure our UNIX/Linux systems.&amp;nbsp; The idea of just using native password controls to secure my critical systems is alarming to me, not to mention having to give the password vaulting technology full blown root access to all of my servers to manage the passwords... WHAT.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 15:10:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1060#M96</guid>
      <dc:creator>SemperFi_guy</dc:creator>
      <dc:date>2017-10-10T15:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1063#M97</link>
      <description>&lt;P&gt;That is great insight you offer with regard to password vaulting.&amp;nbsp; Most solutions or those designed internally don't take into consideration all of the factors that are necessary at a bare minimum to store passwords securely.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These variables are just some of those needed, and of those in this list, they need to be modified to take into account ever-changing variables in the environment we work in:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Use a strong random number generator to create a &lt;STRONG&gt;salt of 32 bits&lt;/STRONG&gt; or longer.&lt;/LI&gt;&lt;LI&gt;Feed the salt and the password into the &lt;STRONG&gt;PBKDF2 algorithm&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Use &lt;STRONG&gt;HMAC-SHA-256&lt;/STRONG&gt; as the core hash inside PBKDF2.&lt;/LI&gt;&lt;LI&gt;Perform &lt;STRONG&gt;40,000 iterations&lt;/STRONG&gt; or more (&lt;U&gt;August 2017&lt;/U&gt;).&lt;/LI&gt;&lt;LI&gt;Take &lt;STRONG&gt;32 bytes (256 bits) of output&lt;/STRONG&gt; from PBKDF2 as the final password hash.&lt;/LI&gt;&lt;LI&gt;Store the &lt;STRONG&gt;iteration count, the salt and the final hash&lt;/STRONG&gt; in your password database.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Increase your iteration&lt;/STRONG&gt; count regularly to keep up with faster cracking tools.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 10 Oct 2017 15:17:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1063#M97</guid>
      <dc:creator>BrianKunick</dc:creator>
      <dc:date>2017-10-10T15:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1069#M99</link>
      <description>&lt;P&gt;Agreed!.&lt;BR /&gt;&lt;BR /&gt;Call me old school but I still like agent based technology to secure my environment.&amp;nbsp; I want to protect not only the front door but also the windows, vents, etc...&amp;nbsp; Using a vault solution is easy and for some environments I am sure it is the right choice (windows system accounts, db account, etc) but easy does not always mean secure.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 15:29:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1069#M99</guid>
      <dc:creator>SemperFi_guy</dc:creator>
      <dc:date>2017-10-10T15:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1084#M102</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/495964229"&gt;@SemperFi_guy&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Password vaulting isn't the only option for Linux-based systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAM allows easy integration with multiple authentication mechanisms. The benefit there is that they remain logically separate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, local/AD passwords could be combined with a second auth mechanism. e.g. a software, or hardware token, via RADIUS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are a great deal of options available.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question of suitable password complexity should no longer be our focus.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The more pertinent question is whether a sufficiently complex password is enough on it's own.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The answer is... no.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 16:32:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1084#M102</guid>
      <dc:creator>sdurbin</dc:creator>
      <dc:date>2017-10-10T16:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1089#M103</link>
      <description>&lt;P&gt;I agree,&amp;nbsp; I was simply voicing my opinion on using passwords in general(which turned into my dislike for password vaults as a PAM solution).&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I today leverage a technology that actually removes the requirement for a password in most cases for the accounts within my UNIX/Linux servers.&amp;nbsp; Only those accounts that require a password are provided with one and all others are assigned a non-hash able password.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 16:35:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1089#M103</guid>
      <dc:creator>SemperFi_guy</dc:creator>
      <dc:date>2017-10-10T16:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1090#M104</link>
      <description>&lt;P&gt;Very good point.&amp;nbsp; Entropy, or password complexity no longer offers the protection of the past.&amp;nbsp; I agree with you as also mentioned in my article that passwords alone are not enough to provide secure credentials.&amp;nbsp; Passwords of sufficient strength are not meant to stand on the own anymore.&amp;nbsp; MFA must be used.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 16:35:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1090#M104</guid>
      <dc:creator>BrianKunick</dc:creator>
      <dc:date>2017-10-10T16:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1094#M105</link>
      <description>&lt;P&gt;SSH key management is also an area where, in organisations of all shapes and sizes, I have seen some very questionable security practices in the past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, more recently there have also been improvements in that domain too!&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 16:47:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1094#M105</guid>
      <dc:creator>sdurbin</dc:creator>
      <dc:date>2017-10-10T16:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1104#M107</link>
      <description>&lt;P&gt;For password strength to mean anything, the strength has to have a definition. &amp;nbsp;The only good in a password is how long it takes to crack after capture. &amp;nbsp;For my purposes, password strength is the time it takes to have a 50/50 odds of cracking a password after capture of a password hash. &amp;nbsp;If the password is captured by a key logger, read from a post it or a vulnerability allows a clear text version of it to be captured from protected memory -- the password is directly captured rather than cracked. &amp;nbsp;Such problems are not addressed by password strength.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two useful bits of math. &amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;First password crackers grow faster than Moore's Law over time, closer to 11 times faster every 10 years for the same dollar cost in crackng hardware. &amp;nbsp;This happens as the hardware gets faster, the price of the faster hardware goes down with time and speed optimiztions in chips, storage, bandwidth, and software improve performance. &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Passwords chosen by humans are not as difficult to search 50% of the available choices as password generated at random. &amp;nbsp;My samples of cracked password files from multiple clients cleanly show a pareto like effect -- 20% of the combinations to search are responsible for 80% of the passwords found. &amp;nbsp;Approximately then, if a human chose the password about 10% of the commbinations to search are worth 50% of the passwords captured to crack. If randomly chosen then 50% of the combinations to search are worth 50% of the passwords captured to crack.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now it is time to describe the search space. &amp;nbsp;Humans like words, even if they add leet adjustments. &amp;nbsp;But each language on earth has word frequency by length of words. &amp;nbsp;For single place passwords there is a very short list. As words go, there are only two such words, "A" and "I". &amp;nbsp;A peak in the middle near 7 place words happen that is used by "CorrectHorseBatteryStaple" to generate a password and then there are very few words longer than 29 letters. &amp;nbsp;"Supercalifragilisticexpialideaxious" is alone at 31 letters long. Really, "CorrectHorseBatteryStapple" is a four place password with 3 7 place words and 1 5 place word. &amp;nbsp;A variable with every word 7 places long can be listed out and all its leet combinations and the entropy of this password is actually smaller than XKDC thinks it is. &amp;nbsp;Still it is not all that bad. &amp;nbsp;Once we know the places of a password to search and the number of options per variable the math of combinations is not that bad. &amp;nbsp;I use spreadsheet functions to help. &amp;nbsp;Lets stick with Letters, Numbers, Symbols and Extended Ascii for example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;N_l = places of letters&amp;nbsp;&lt;/P&gt;&lt;P&gt;N_n = places of numbers&amp;nbsp;&lt;/P&gt;&lt;P&gt;N_s = places of symbols&lt;/P&gt;&lt;P&gt;N_e = places of extended ASCII&lt;/P&gt;&lt;P&gt;It starts with placement of these variable inside the password then goes to places and finally combinations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Combo = Placement * Places&lt;/P&gt;&lt;P&gt;Placement = fact(N_l + N_n + N_s + N_e) / (fact(N_l) * fact(N_n) * fact(N_s) * fact(N_e)&lt;/P&gt;&lt;P&gt;Places = (52)^N_l * (10)^N_n * (31)^N_s * 163^N_e&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If human selected then true combinations to search is closer to 10% * Combo.&lt;/P&gt;&lt;P&gt;If a random password generator selected then the true combos to search is near 50% * Combo. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Both will lead to the 50/50 odds of cracking the password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now for the effect of Moore's law on password cracking speed. &amp;nbsp;For simplicy we will use 10 times faster every 10 years for the same true dollar spend on the cracking rig. &amp;nbsp;The math still works even if the attacker simply buys a new rig each year and splits the combinations to search among them over time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Combinations per second = cps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cps(t) = cps(0) * 10^(T/10years) &amp;nbsp;&lt;/P&gt;&lt;P&gt;C(t) = cps(0)*(sec/yr)*10years*ln(10)*(10^(T/10yrs)-1)&lt;/P&gt;&lt;P&gt;T(C) = 10 years * ln(C/(cps(0)*(sec/yr)*10yrs*ln(10)+1)/ln(10)&lt;/P&gt;&lt;P&gt;T(C) = 10 years * ln(Combs / (cps(0) / (365.2425*24*3600*10*ln(10)) +1)/ln(10)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From this, we can actually compute password strength once we know how fast a password cracking rig is and what it cost at least once in history and project forward correclty accounting for Moore's Law such as the drops in price of computing hardware over time, inflation, speed improvements in software, upgrades in hardware over time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Macbook Pro Air -- 32 GB flash ram -- I wrote this from now costs about 2.3k and in August 2013 achevied 6 billion combinations per second. &amp;nbsp;If I bought the next cracking computer for 3.3k, with the right specificaitons &amp;nbsp;it would be faster. &amp;nbsp;Note: splitting the job among parallel computers often gets eclypsed by the growth in speed of Moore's law so parallel computing is only really useful over a 5 year horizon or so, unless it is just cost effective per compute cycle. &amp;nbsp;Consider that sometimes Amazon Cloud Services does not charge full price if you do not download data but only use compute cycles. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what is a strong password really? &amp;nbsp;First consider the 6 billion combinations per second problem.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Average language has 100,000 words. &amp;nbsp;10 leet combos per word, 1,000,000 combinations to test. &amp;nbsp;6,000 languages later, we have a single word password with leet cracking in a target time of 1 second. &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;The password is forced to change ever 3 months. &amp;nbsp;Such a password better have a half-life -- time to reach 50/50 odds of cracking -- longer than 3 months.&lt;/LI&gt;&lt;LI&gt;The average password cracking effort lasts about 2 hours. &amp;nbsp;All the easy cracks fall out quickly and watching the computer grind gets boring after a while. &amp;nbsp;Even Police units admit to self terminating password cracking efforts after about 36 hours. &amp;nbsp;So, the password at least needs a half-life of 36 hours or so.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Care to use the math above to work out how long your password would last against my Macbook that costs 2.3K?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Simply sort your language or spell check dictionaries by word length assemble variables by word length. &amp;nbsp;GNU Aspell is not a bad source for free dictionaries in many languages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Go long and memorable. &amp;nbsp;Avoid short words. &amp;nbsp;Skip leet and just add complexity to meets the allowed limits. &amp;nbsp;Even one place longer than a pre-computed Rainbow Table and the password has a chance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 17:43:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/1104#M107</guid>
      <dc:creator>arctific</dc:creator>
      <dc:date>2017-10-10T17:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/2465#M237</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/735020181"&gt;@arctific&lt;/a&gt;this is why the latest advice is use a random password generator and secure encrypted vault for any passwords. this then obviscates any rainbow tables, and improves the complexity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Beyond this, it comes down to using behaviour and environmental scores turning to a risk based approach. If they are logging in from their desk at the time they usually come in, after having swiped in the building, then a password may be sufficient, if they are loging in form an unrecognised device in a country you dont operate in over a wifi network then maybe step up to a second factor&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2017 10:36:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/2465#M237</guid>
      <dc:creator>EnviableOne</dc:creator>
      <dc:date>2017-10-30T10:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/3066#M316</link>
      <description>&lt;P&gt;We talk about what was good enough 20 years ago, isn't good enough today. It's amazing when you think about it and no doubt, soon enough we'll be saying "What was good enough 3 years go, isn't good enough for today!"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Things are evolving exponentially faster today. The technology that allows the attackers to crack PWs is evolving at light speed compared to 20 years ago.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I feel that MFA will become the base standard for authentication and access control within the next few years. If you don't have it, you'll be considered way behind and COMPLETELY vulnerable to brute force attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great article.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 18:46:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/3066#M316</guid>
      <dc:creator>KPentecost</dc:creator>
      <dc:date>2017-10-31T18:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/3230#M331</link>
      <description>&lt;P&gt;I think the battle is to try and walk the familiar line between ease of use versus security. I agree the overly complicated NIST requirements and the horrible password practices that it spawned were actually detrimental to good password practices. It has to be at least 14 characters long, 1 from each group, no character repeated more than twice in a row, not a common dictionary word or a L33T version of said words, AND don't write it down. Oh yeah, have another one ready to go in 90 days because we are going to make you change it and it can't be any of the last 10 really difficult but easy to remember passwords that you came up with.&lt;/P&gt;&lt;P&gt;I write my passwords down in a big book. WHAT? You say?&lt;/P&gt;&lt;P&gt;I reuse passwords? Again you may be shaking your head saying that I am violating all of the "good" password rules we learned while preparing for the CISSP. But here's my catch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you got a hold of my book you would not be able to log in with any of them without cracking my code. Basically it is more of a password hint book. When I reuse my passwords I do it because I group like minded accounts together. i.e. all of my learning/training accounts use the same password so if you were able to crack my code you would only gain access to my learning accounts. And the passwords for my financial accounts are way different (and I do not reuse a password for the important accounts or vary them enough that you would lock them out before guessing). Each email address has a different password. My password reset requests are sent to my phone and a back up email address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have got to find ways to help people come up with more secure methods for using passwords while at the same time making it easier for them. I like the example showing how using a simple phrase can make it harder for the attackers to crack but easier for the user to remember.&amp;nbsp;I am a big believer in using Hidden in plain sight passwords. Got a favorite phrase on a sign in your office? "Those Who Do Not Remember History Are Doomed To Repeat It. - Albert Einstein. 1947." = TWDNRHADTRI-ae1947 that would be pretty hard for a machine to crack but right where the person using the computer could see it or remember it.&amp;nbsp; (And please do not assume that that was a correct quote and attributed to the correct person and timeframe, I just made it up to provide an example.) Teach the users how to make it simpler and easier for them. Also educate on how a hacker would compromise their accounts. Go through the process they would use. Show them the vulnerable points in their thought process around passwords. Show them how answering a seemingly innocent quiz/survey on Facebook of "what kind of Princess are you?" could be getting them to disclose the answers to the security questions on their verification process for password resets. (i.e. what is your favorite color?, etc)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The answer lies in education. If you are not involved in your new employee education process at work, get involved. Ensure what the new employees are given is timely and useful. If you hear misinformation being given out at family gatherings, speak up and educate them.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 15:21:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/3230#M331</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-11-02T15:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/4821#M525</link>
      <description>&lt;P&gt;I use a password safe myself. &amp;nbsp;Bare in mind this approach has some pros/cons also.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The good part:&lt;/P&gt;&lt;P&gt;1) Human Memory: I can track 200 unique passwords in a single spot. &amp;nbsp;I really only have to remember the password to get in to the password safe.&lt;/P&gt;&lt;P&gt;2) Password Generators: &amp;nbsp;I can have the safe automatically generate random passphrases of appropriate length &amp;nbsp;that also fit the varying complexity requirements for each account.&lt;/P&gt;&lt;P&gt;3) Personal Dictionary: As sites get different passwords, an attacker can use my cracked passwords as a personal dictionary attack to try to crack sites with better security using my password patterns from sites with weak securty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The items to watch:&lt;/P&gt;&lt;P&gt;A) Encryption Strength of the Password Safe: AES 256 or better is recommended.&lt;/P&gt;&lt;P&gt;B) The Password of &amp;nbsp;the Password Safe needs to be really, really, really, strong. &amp;nbsp;It protects all other accounts you have access to. &amp;nbsp;It should actually be no less strong than any account with the safe.&lt;/P&gt;&lt;P&gt;C) Password Capture: the system where the password safe resides is the gold mine for a key logger or protected memory capture in clear text of the password for the password safe. &amp;nbsp;Tripple up on system hardening of the system with the password safe. &amp;nbsp;Information Security operations are finding hacked smart phones of systems administrators where the password safe was downloaded and password captured usually by a key logger. &amp;nbsp;&lt;/P&gt;&lt;P&gt;D) Automatic password entry into a website, tool for a reduced sign-on experience means that the browser cache is a prime target for capturing passwords. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recommendations for safer uses of Password Safes or Encrypted Drives with vital data files:&lt;/P&gt;&lt;P&gt;1) Never, Ever store the password for a password safe in a Key Chain, Browser Cache, etc. &amp;nbsp;MEMORIZE the beastly password.&lt;/P&gt;&lt;P&gt;2) Use Physical Security to protect the sysem with a password safe. &amp;nbsp;An dual mode attack could seek physical accesss to the system to download a copy and then off site submit the safe to cracking efforts. &amp;nbsp;The physical security measures should be aimed to give you a tip-off that this has happened so the safe contents and safe password can be changed faster than the crack can succeed.&lt;/P&gt;&lt;P&gt;3) The password is not an excuse to relax on password strength: complexity, length or uniqueness per site. &amp;nbsp;If 74% of users have the same password for their online banking as they use of other sites &amp;nbsp;-- like facebook -- then all the attacker needs to do is hack facebook then guess your bank. &amp;nbsp;Your safe will not help you protect passwords from hacks of weaker websites. &amp;nbsp;Use the safe to your advantage and be unique per site.&lt;/P&gt;&lt;P&gt;4) Go long even if the password is randomly generated. &amp;nbsp;Pre-computed rainbow tables can still crack passwords whether they are in your safe or not. &amp;nbsp;One digit longer than an attackers rainbow table saves the day. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2018 15:07:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/4821#M525</guid>
      <dc:creator>arctific</dc:creator>
      <dc:date>2018-01-06T15:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Password strength – fiction, fact, or what should secure your environment?</title>
      <link>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/8141#M733</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/735020181"&gt;@arctific&lt;/a&gt;The Point with the password safe is you cut the numbe rof passwords you have to remeber down to 1 (the vault password) which you can then choose carefully and make as complex as you like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;most of my previous comments were paraphrasing the latest advice from the UK NCSC, and my favourite password activist Troy Hunt, but its clear to see we have basically created a system where people are forced to create passwords that are hard for humans to handle and just as easy for computers to guess, leading to work-arounds with passwords like P45sw0rd101! which are in most crackers first tranche of tries, but password strenght meters call them secure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The simple plan is:&lt;/P&gt;&lt;P&gt;Dispose of complexity and increase minimum length (more chars increases combinations x^n more options is only nx)&lt;/P&gt;&lt;P&gt;encourage the use of password vaults&lt;/P&gt;&lt;P&gt;only enforce password change on indication of breach&lt;/P&gt;&lt;P&gt;dis-allow known or common passwords&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Troys post ties it all together:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/" target="_blank"&gt;https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Password strength re-imagined&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/wheeler" target="_blank"&gt;https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/wheeler&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Mar 2018 10:08:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Password-strength-fiction-fact-or-what-should-secure-your/m-p/8141#M733</guid>
      <dc:creator>EnviableOne</dc:creator>
      <dc:date>2018-03-06T10:08:26Z</dc:date>
    </item>
  </channel>
</rss>

