<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How easy are passwords to crack (times) in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74876#M4620</link>
    <description>&lt;P&gt;I watched an ISC2 webinar where Bruce Schneier broke into a computer with MFA/2FA in moments just using cookies.&amp;nbsp; No password was needed.&amp;nbsp; So we should never feel too secure.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Nov 2024 19:50:18 GMT</pubDate>
    <dc:creator>nkeaton</dc:creator>
    <dc:date>2024-11-01T19:50:18Z</dc:date>
    <item>
      <title>How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74708#M4613</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1729325928531.jpg" style="width: 400px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/9152i7329032A027E1C96/image-size/medium?v=v2&amp;amp;px=400" role="button" title="1729325928531.jpg" alt="1729325928531.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 21:51:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74708#M4613</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-10-24T21:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74722#M4614</link>
      <description>&lt;P&gt;Be cautious with what one takes away from this chart.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, it implies that "Password1!" would take 33,000 years to break, which is clearly not the true, given that it shows up in the top-10 list of nearly every "common passwords" list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One also needs to question if they even believe their own results.&amp;nbsp; Live on earth has existed for 300k years, yet they require 1,000,000k for green.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the other hand, one can properly use it to learn that a password consisting solely of lowercase letters is equivalent in strength when 25% longer than a "complex" (upper/lower/digit/special) password.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The most important password advise I can give to my CISSP peers is that passwords can not be made "good enough" to protect anything sensitive.&amp;nbsp; Instead, one needs to augment them with multi-factor, completely replace them newer technology (e.g. passkeys), and/or make login pages accessible only from protected/secure locations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And, for as long as we need to put up with passwords, do read up on what NIST has to say in &lt;A href="https://pages.nist.gov/800-63-3/sp800-63b.html#appA" target="_blank" rel="noopener"&gt;Appendix A&lt;/A&gt; of their Identity Guidelines.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 18:02:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74722#M4614</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2024-10-25T18:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74723#M4615</link>
      <description>&lt;P&gt;You may want to be aware of this:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules?fbclid=IwY2xjawGIw_9leHRuA2FlbQIxMAABHfGjzZmQLUnp1hKXjRlEMTbEfhh92GMxuWpspBXqK7oKk943pmtixT0GdQ_aem_cWQRw5VPGmdfsWWI-gqavQ" target="_blank" rel="noopener"&gt;https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules?fbclid=IwY2xjawGIw_9leHRuA2FlbQIxMAABHfGjzZmQLUnp1hKXjRlEMTbEfhh92GMxuWpspBXqK7oKk943pmtixT0GdQ_aem_cWQRw5VPGmdfsWWI-gqavQ&lt;/A&gt;&amp;nbsp; I will paste in the very beginning of it here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;The National Institute of Standards and Technology (NIST) is no longer recommending using a mixture of character types in passwords or regularly changing passwords.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;NIST's second public draft version of its password guidelines (&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://pages.nist.gov/800-63-4/sp800-63b.html" target="_blank" rel="noopener"&gt;SP 800-63-4&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;) outlines technical requirements as well as recommended best practices for password management and authentication. The latest guidelines instruct credential service providers (CSP) to stop requiring users to set passwords that use specific types or characters or mandating periodic password changes (commonly every 60 or 90 days). Also, CSPs were instructed to stop using knowledge-based authentication or security questions when selecting passwords.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Other recommendations include:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CSPs shall require passwords to be minimum of eight characters in length and should require passwords to be a minimum of 15 characters in length.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CSPs should allow passwords of a maximum of at least 64 characters.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CSPs should allow ASCII and Unicode characters to be included in passwords.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 25 Oct 2024 18:47:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74723#M4615</guid>
      <dc:creator>nkeaton</dc:creator>
      <dc:date>2024-10-25T18:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74729#M4616</link>
      <description>&lt;P&gt;The National Cyber Security Centre recommends 3 random words:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/three-random-words" target="_blank"&gt;https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/three-random-words&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This makes it relatively easy to set a 15 to 20 character password that you will remember.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Oct 2024 11:14:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74729#M4616</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2024-10-26T11:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74749#M4618</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/253792811"&gt;@nkeaton&lt;/a&gt;&amp;nbsp;the best advice I ever heard about passwords is that they should include as much randomization as possible when they are composed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that's something which is nearly impossible to scale for a single user, at least without using a password manager.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So when NIST first changed its guidelines in the 2010's (which discouraged &lt;EM&gt;complexity&lt;/EM&gt; and promoted &lt;EM&gt;length&lt;/EM&gt;), as&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;said, changing to passphrases with random words seemed like a very good solution.&amp;nbsp; Random, unrelated words seems to scale a little easier for people who need a strong password in a pinch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's my two cents (which now costs six cents each to make).&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 15:17:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74749#M4618</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-10-28T15:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74819#M4619</link>
      <description>&lt;P&gt;The other thing to keep in mind is that where MFA cannot be deployed, longer passwords are beginning to be mandated, for example by the PCI SSC.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 08:03:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74819#M4619</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2024-10-31T08:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74876#M4620</link>
      <description>&lt;P&gt;I watched an ISC2 webinar where Bruce Schneier broke into a computer with MFA/2FA in moments just using cookies.&amp;nbsp; No password was needed.&amp;nbsp; So we should never feel too secure.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 19:50:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74876#M4620</guid>
      <dc:creator>nkeaton</dc:creator>
      <dc:date>2024-11-01T19:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: How easy are passwords to crack (times)</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74913#M4624</link>
      <description>&lt;P&gt;That's just an example of a technology failing.&amp;nbsp; A password was still necessary to protect the resource, but its output was improperly stored, or was manipulated in ways which should have been prevented.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 04:03:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-easy-are-passwords-to-crack-times/m-p/74913#M4624</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2024-11-04T04:03:39Z</dc:date>
    </item>
  </channel>
</rss>

