0% found this document useful (0 votes)
11 views

Lesson4Lec DataSecurityAwareness

Uploaded by

Royu Breaker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Lesson4Lec DataSecurityAwareness

Uploaded by

Royu Breaker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

LESSON 4:

Lecture

PASSWORDS &
AUTHENTICATION

SEC 101 – SECURITY AWARENESS


Lesson Objectives:

1. Understanding the importance of passwords.


2. Appreciating the use of passwords and authentication.
3. Understanding the uses of different types of
authentication

SEC 101 – SECURITY AWARENESS 1-2


1. When it comes to protecting your information 3. The challenge is that since passwords are so widely
online, passwords are the most-used form of used, the number of insecure accounts is substantial.
authentication for websites and applications a like. Not to mention, passwords can provide a false sense of
However, passwords are also one of the most insecure security when users are woefully unaware of the
forms of user authentication out there. vulnerabilities they bring. Passwords are not only
difficult to manage on a personal level but can also
2. Upon registration, users create a unique ID and key
cause large-scale data breaches when they are easily
(typically a username and password) that are then
guessed or cracked by hackers.
stored securely on the website’s server. Ideally, the user
is the only person with knowledge of their password, 4. Furthermore, if your business is using
making it so that they’re the only one able to access the passwords to protect internal accounts and your user
account. When the user re-enters their credentials, they database, you and your user’s sensitive data could be at
are checked against those stored in the web server and, risk.
if they are a match, the user is verified. There’s a lot to unpack here! Before we jump in,
let’s walk through some of the most commonly asked
questions and answers when it comes to password-
based authentication.

SEC 101 – SECURITY AWARENESS 1-3


WHAT ARE 3 TYPES OF
AUTHENTICATION ?
Authentication is the process that ensures the individual requesting access to a
system, website, or application is the intended user. There are three main
methods used for authentication purposes:

KNOWLEDGE-BASED: Also referred to as


“something you know.” This category includes Inheritance-based: Also referred to as
traditional passwords. When a user creates a unique “something you are.” These are typically
password for their account, it then becomes the key to biometric characteristics such as a fingerprint or
re-enter that account time and time again. It’s facial scan that is then used to verify the user’s
something that the user (and hopefully only the user) identity. Without these authentication processes,
knows. sensitive user information would be available
POSSESSION-BASED: Also referred to as “something you have.” on the web with no restrictions, meaning it
In this scenario, an individual verifies their identity using something
that only the intended user would have. For example, a user could
could easily fall into the wrong hands.
swipe a physical key card or prove access to a separate personal email
account to show that they are who they say they are.

SEC 101 – SECURITY AWARENESS 1-4


WHAT IS A PASSWORD
AUTHENTICATION ?
Password authentication is a process that involves a user
inputting a unique ID and key that are then checked against
stored credentials.

You’ve likely been asked to create and/or enter a password


to gain access to a personal account, whether that’s a social
media platform or an online banking tool. When you do so,
you’re taking part in a password authentication system that
keeps your sensitive information safe from unauthorized users.
The idea is that only the person who created and set the
password will know it and be able to repeat it, thus verifying
their identity as the original user and providing access to
restricted data and resources.

SEC 101 – SECURITY AWARENESS 1-5


HOW PASSWORDS STORED ?

When a user creates a password, a copy of that credential is


stored by the system or website in a secure password database
against which the server can compare any further login attempts.
Because all those passwords are stored in a centralized location,
(which would be a field day for hackers) it’s important that
password-based authentication systems ensure top-notch security
for those databases.

Typically, passwords are stored in an encrypted fashion so


that even if a hacker is able to access the database, the
information they see would be of no use to them. This is called
salting and hashing your passwords, which we’ll get into further
detail below.

SEC 101 – SECURITY AWARENESS 1-6


WHAT ARE PASSWORD ALTERNATIVES ?
A password alternative is any sort of authentication
protocol that doesn’t utilize a typical ID and key to grant users
access. Going back to the three types of
authentication, password alternatives often fall into possession
or inheritance-based methods.

Our favorite password alternative (in fact, our favorite


authentication method overall) is email authentication. For
websites and applications that offer Swoop’s email
authentication as a password-free alternative, users can simply
verify their identity by following a pre-determined action (such
as clicking a secure magic link or sending a magic message)
from their personal email account.

Whether your organization is set on using password


authentication or you’re exploring password less alternatives, it’s
important to be aware of a password’s weaknesses so that you
can find a secure way to protect your data.
SEC 101 – SECURITY AWARENESS 1-7
List of top password authentication vulnerabilities as well as
these recommended ways your company can avoid them:

1. User-Generated Credentials
2. Down Brute-Force Attacks
3. Recycled Passwords
4. Large-Scale Breaches

SEC 101 – SECURITY AWARENESS 1-8


1. USER GENERATED CREDENTIALS

•How do user-generated credentials pose a threat?

• Since users have to create their own passwords,


there’s always a chance they won’t create secure
credentials. In fact, around 90% of user-generated
passwords are considered weak and easily vulnerable to
hacking.

• Whether it’s because users want to have a password


that’s easy to remember, they aren’t up to date on
password security best practices, or subconsciously (and
even consciously) use patterns to generate their
passwords, this type of authentication has its flaws.

• Even if your website is equipped with a password


strength-checking tool, (like the ones below) the results
can be inconsistent and inaccurate, often leading users
into a false sense of security.

SEC 101 – SECURITY AWARENESS 1-9


Creating complex passwords is difficult because our minds
are drawn towards patterns. Think about the passwords you
create. They likely all follow a similar formula, like using a
word with numbers and a special character at the end.

While these patterns make it easier for us to remember our


credentials, cybercriminals are also aware of the common
formulas people use to create passwords. As a result, hackers can
use this knowledge to adjust how their brute-force systems run
through password combinations or crack your password making
an educated guess.

SEC 101 – SECURITY AWARENESS 1-10


HOW CAN I SECURE
USER GENERATED CREDENTIALS ?
Password authentication isn’t secure enough on its own because it puts the
(likely, uninformed) user in charge of protecting their sensitive
information. Instead, web developers need to take the initiative to ensure their
users’ data is protected in other ways.

If your website continues to use passwords in your website authentication


system, you should consider offering some alternatives or multi-factor
systems to add some additional levels of security.
For example, email authentication is an easy and effective way to offer
your users a safer way to engage with your site. Email clients already employ
tighter security protocols than most other websites can offer in addition to
built-in two-factor authentication, so the credentials tend to be relatively
secure. Some users might shy away from these options, but offering them in
addition to other authentication systems will boost security all-around.

SEC 101 – SECURITY AWARENESS 1-11


Additionally, developers should make a point to scan all newly created
passwords through a list of commonly used or compromised credentials. When
a user tries to create new credentials using a weak password, they’ll be asked to
use a different credential before proceeding.

Take a look at this chart with some best practices for ensuring
password security. When your team implements criteria such as these into the
back-end of password requirements, it can reduce the number of insecure
credentials that get through.
As a result, users are forced to create stronger passwords and avoid those
that can be easily guessed. However, it’s important that your team stays up-to-
date with all the latest password protection protocols, as best practices are
constantly evolving alongside authentication technology.

SEC 101 – SECURITY AWARENESS 1-12


2. BRUTE FORCE ATTACKS

How do brute-force attacks pose a threat?

Simply put, a brute-force attack occurs when a computer program runs through every
password combination until they find a match. The system will run through all one-digit
combinations, two-digit combinations, and so forth until it cracks your password. Some
programs specifically focus on combing through the most commonly used dictionary words,
while others target popular passwords against a list of possible usernames.

As technology evolves, so do the tools hackers use to crack people’s credentials. Aside
from merely guessing your password, a brute-force attack is the most common technique
hackers use.
To make matters worse, these systems are able to run through thousands of combinations
in less than a second, which means that shorter passwords can be cracked in a very short time
frame.

SEC 101 – SECURITY AWARENESS 1-13


How can I secure against brute-force attacks?
The first thing you should do is ensure that hackers can’t use brute-force attacks for
individual accounts. Companies can achieve this by limiting the number of login attempts
and password reset requests for every account and IP address range.

For instance, you’ll need to ask yourself:


 How many login attempts and password reset requests will each user and IP address
receive? The limit for IP addresses should be more than the limit for users. This is
because multiple accounts could be using the same IP address, such as in an office
setting.
 How long will the account be temporarily blocked? Once a user has reached the
allowed number of requests, the account should be blocked for a short period of time.
The recommendation is 10-15 minutes, although you may choose to go higher or lower
than that.

SEC 101 – SECURITY AWARENESS 1-14


 When should we block an IP address from making login attempts? If there has been a lot of unusual
behavior from a specific IP address, it might be in your website’s best interest to permanently block it
from making login attempts. However, blocking IP addresses also runs the risk of excluding real users, so
you’ll want to be careful.

In addition to making these changes, it’s also important that you encourage users to create longer and
stronger passwords, as recommended in the previous section. This is because the longer a user’s password is,
the longer it will take for a computer to gain access. And hopefully, your system will be able to lock the
hacker out before that even happens!

SEC 101 – SECURITY AWARENESS 1-15


How can I secure against recycled passwords?

Because it’s wholly unrealistic to expect users to manage 90-something unique passwords, one effective
solution is to encourage users to connect multiple accounts with a single, ultra-secure password.
For example, we already mentioned that email clients tend to have stronger password security
regulations. It makes sense to use that as a tool to authenticate further online accounts as well.
However, social media platforms such as Facebook and Twitter have also become popular resources for
streamlining the registration and login processes.

SEC 101 – SECURITY AWARENESS 1-16


3. LARGE SCALE BREACHES

How do large-scale breaches pose a threat?

A hacker might attempt to crack an individual’s credentials using a brute force attack. However, the
real goal is often to gain access to the website’s user database. Once hackers have cracked the master
code, they’ll have a list of all your users’ credentials, and as a result, no level of password security will
be able to protect your users.
Password breaches are becoming a real concern for businesses and organizations of all sizes.
Storing all of your users’ credentials puts you at risk, and simply encrypting the information is often not
enough. Instead, developers need to understand that weak internal passwords and improper storage of
credentials could make a hacker’s job easier.
Additionally, the password breaches of other websites could affect your website’s security. Think
about it: if you’re using a service from a company that recently had a password breach, your own
employees’ accounts could be compromised, which means your end users are also at risk. Once a big
company gets hacked, the consequences can start to trickle down fairly quickly.

SEC 101 – SECURITY AWARENESS 1-17


HOW CAN I SECURE AGAINTS LARGE
SCALE BREACHES ?

If your organization continues to use passwords as a user authentication method, it’s important that you
store your passwords with more than just encryption. In fact, you can boost your website’s overall security
by:
 Hashing your passwords. Hashing your passwords translates them into a random set of characters.
Once the data has been hashed, it’s extremely difficult to decode the information without the key. This
is especially useful for passwords because they don’t need to be read back. When users log in, the
same hashing will be applied and then compared to the information on file.

 Salting your passwords. This technique adds an extra value at the end of your passwords so that it’s
harder to determine what the actual credential is. For instance, the password “admin” would change to
“admin+salt” when salt is added. For an additional security precaution, the salt added to each
password should be random and unique.

SEC 101 – SECURITY AWARENESS 1-18


Generally, salting occurs after a password has been hashed, meaning that the two processes often
work together to ensure additional layers of security. By both salting and hashing your passwords,
you’re adding new protections to your database, which makes deciphering the data and gaining access to
user information harder to achieve.

However, it’s important to recognize that as our password- based technology improves,
cybercriminals’ tools are often trailing not far behind. In fact, some hackers have figured out how to run
brute-force attacks on passwords even after they’ve been salted and hashed!

As you can see, password authentication has many weaknesses that can put you and your users’
sensitive information at risk. Hopefully, this article has made you more aware of password weaknesses
and ways you can improve your website’s vulnerabilities. Don’t wait to make changes until it’s too late!

SEC 101 – SECURITY AWARENESS 1-19

You might also like