{"id":1892,"date":"2010-01-30T20:46:56","date_gmt":"2010-01-31T01:46:56","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=1892"},"modified":"2022-12-30T12:40:50","modified_gmt":"2022-12-30T17:40:50","slug":"password-insecurity","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/password-insecurity\/","title":{"rendered":"Password Insecurity"},"content":{"rendered":"<p><a title=\"Password Insecurity\" href=\"https:\/\/web.archive.org\/web\/20200815115350\/https:\/\/nerdyloft.com\/tag\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1984 size-medium alignleft\" style=\"border: 0pt none; margin: 0px 2px;\" title=\"Password Insecurity\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/password.jpg?resize=150%2C107&#038;ssl=1\" alt=\"password\" width=\"150\" height=\"107\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/password.jpg?resize=300%2C214&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/password.jpg?resize=150%2C107&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/password.jpg?w=602&amp;ssl=1 602w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a> The massive <a href=\"https:\/\/www.computerworld.com\/article\/2522045\/rockyou-hack-exposes-names--passwords-of-30m-accounts.html\" target=\"_blank\" rel=\"noopener noreferrer\">Rockyou.com<\/a> breach reveals the weakness of the password. The Rockyou.com breach provided an opportunity to evaluate the true strength of passwords as a security mechanism. California-based security firm <a title=\"www.imperva.com\" href=\"https:\/\/www.imperva.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Imperva<\/a> analyzed the stolen cache of 32 million passwords and the results are not pretty. According to researchers, most passwords are eight or fewer characters and nearly 30% of passwords were six characters or less. They also found Nearly 50% of users used names, slang words, dictionary words, or trivial passwords (consecutive digits, adjacent keyboard keys, and so on), and 20 percent are from a pool of 5,000 passwords. The ten most common passwords used were:<\/p>\n<ol>\n<li>123456<\/li>\n<li>12345<\/li>\n<li>123456789<\/li>\n<li>Password<\/li>\n<li>iloveyou<\/li>\n<li>princess<\/li>\n<li>rockyou<\/li>\n<li>1234567<\/li>\n<li>12345678<\/li>\n<li>abc123<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.imperva.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1989 \" style=\"border: 0pt none; margin: 4px;\" title=\"imperva_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/imperva_logo.jpg?resize=186%2C26&#038;ssl=1\" alt=\"Imperva\" width=\"186\" height=\"26\" \/><\/a>\u201cThe problem has changed very little over the past 20 years,\u201d explained Imperva\u2019s CTO Amichai Shulman, referring to a 1990 Unix password study that showed a password selection pattern similar to what consumers select today. \u201cIt\u2019s time for everyone to take password security seriously; it\u2019s an important first step in <a title=\"Data security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_security\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">data security<\/a>. It\u2019s important to point out that, the same password \u201c123456\u201d also topped a similar chart based on a statistical analysis of 10,000 Hotmail passwords published <em>(Link removed at the request of Acunetix)<\/em> October 2009 by Acunetix <em>(Link removed at the request of Acunetix)<\/em>.<\/p>\n<p>\u201cEveryone needs to understand what the combination of poor passwords means in today\u2019s world of automated cyber attacks: with only minimal effort, a hacker can gain access to one new account every second\u2014or 1000 accounts every 17 minutes,\u201d explained Shulman in a <a title=\"www.imperva.com\" href=\"https:\/\/web.archive.org\/web\/20140326180930\/http:\/\/www.imperva.com\/news\/press\/2010\/01_21_imperva_releases_detailed_analysis_of_32_million_passwords.html\" target=\"_blank\" rel=\"noopener noreferrer\">press release<\/a>.<\/p>\n<p>For enterprises, password insecurity can have serious consequences. \u201cEmployees using the same passwords on Facebook that they use in the workplace bring the possibility of compromising enterprise systems with insecure passwords, especially if they are using easy to crack passwords like \u2018123456\u2019,\u201d said Shulman.<\/p>\n<p>The rest of the passwords rated by popularity:<\/p>\n<p style=\"text-align: center;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-92171\" title=\"Imperva passwords\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imperva_passwords_popularity_rockyou_breach.jpg?resize=411%2C181&#038;ssl=1\" alt=\"Imperva passwords\" width=\"411\" height=\"181\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imperva_passwords_popularity_rockyou_breach.jpg?resize=150%2C66&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imperva_passwords_popularity_rockyou_breach.jpg?resize=75%2C33&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imperva_passwords_popularity_rockyou_breach.jpg?resize=768%2C338&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imperva_passwords_popularity_rockyou_breach.jpg?w=865&amp;ssl=1 865w\" sizes=\"auto, (max-width: 411px) 100vw, 411px\" \/><\/p>\n<p>Some of the lessons that firms can lead from the Imperva research are:<\/p>\n<p style=\"padding-left: 30px;\">1) Most users use short passwords which lack a lower-capital-numeric characters mix or trivial dictionary words which every decent brute-forcing\/password recovery application can find in a matter of minutes.\u00a0 A hacker will typically take 17 minutes to gain access to 1000 accounts.<\/p>\n<p style=\"padding-left: 30px;\">2) Strong password algorithms must be coupled with longer passwords that contain a mix of letters, numbers, and, where possible, punctuation.<\/p>\n<p style=\"padding-left: 30px;\">3) Firms should emulate <a href=\"http:\/\/www.twitter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter\u2019s<\/a> \u201c<a title=\"www.techcrunch.com\" href=\"https:\/\/www.businessinsider.com\/twitters-list-of-370-banned-passwords-2009-12\" target=\"_blank\" rel=\"noopener noreferrer\">banned passwords<\/a>\u201d list consisting of 370 passwords that are not allowed to be used.<\/p>\n<p>The analysis proves that most people don&#8217;t care enough about their own online security to give more than a fleeting thought when choosing the password which secures access to their accounts.\u00a0 This research shows why firms must take proactive actions to manage their users&#8217; choices in passwords.<\/p>\n<p><strong>PASSWORD RELATED SECURITY BEST PRACTICES:<\/strong><\/p>\n<p>\u2022 All passwords are to be treated as sensitive, confidential corporate information.<br \/>\n\u2022 Don&#8217;t use the same password for corporate accounts and non-corporate accounts (e.g., Facebook, Twitter, personal ISP account,\u00a0 etc.).<br \/>\n\u2022 If someone demands a password call someone in the Information Security Department.<br \/>\n\u2022 Change passwords at least once every four months.<br \/>\n\u2022 Do not use the &#8220;Remember Password&#8221; feature of applications (e.g., Eudora, <a title=\"Microsoft Outlook\" href=\"https:\/\/www.microsoft.com\/mac\/outlook\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Outlook<\/a>, <a title=\"Netscape Mail &amp; Newsgroups\" href=\"https:\/\/web.archive.org\/web\/20210307002848\/http:\/\/browser.netscape.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Netscape Messenger<\/a>).<br \/>\n\u2022 If an account or password is suspected to have been compromised, report the incident and change all passwords.<\/p>\n<p><strong>Strong passwords characteristics:<\/strong><br \/>\n\u2022 At least eight (8) alpha-numeric characters<br \/>\n\u2022 At least one numeric character (0-9)<br \/>\n\u2022 At least one lower case character (a-z)<br \/>\n\u2022 At least one upper case character (A-Z)<br \/>\n\u2022 At least one non-alphanumeric character* (~, !, @, #, $, %, ^, &amp;, *, (, ), -, =, +, ?, [, ], {, })<br \/>\n\u2022 Are not a word in any language, slang, dialect, jargon, etc.<br \/>\n\u2022 Are not based on personal information, names of family, etc.<br \/>\n\u2022 Are never written down or stored online.<\/p>\n<p><strong>Password\u00a0 &#8220;dont&#8217;s&#8221;:<\/strong><br \/>\n\u2022 Don&#8217;t reveal a password over the phone to ANYONE<br \/>\n\u2022 Don&#8217;t reveal a password in an email message<br \/>\n\u2022 Don&#8217;t reveal a password to the boss<br \/>\n\u2022 Don&#8217;t talk about a password in front of others<br \/>\n\u2022 Don&#8217;t hint at the format of a password (e.g., &#8220;my family name&#8221;)<br \/>\n\u2022 Don&#8217;t reveal a password on questionnaires or security forms<br \/>\n\u2022 Don&#8217;t share a password with family members<br \/>\n\u2022 Don&#8217;t reveal a password to co-workers while on vacation<\/p>\n<p><strong>OTHER PASSWORD-RELATED SECURITY BEST PRACTICES:<\/strong><br \/>\n\u2022 Account Lockout: all systems should be set to &#8220;lockout&#8221; a user after a maximum of 5 incorrect passwords or failed login attempts<br \/>\n\u2022 Lockout Threshold: all systems should have a minimum &#8220;lockout&#8221; time of five (5) minutes<br \/>\n\u2022 Password History: systems should be configured to require a password that is different from the last ten (10) passwords<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20230529125010\/https:\/\/ryanlanz.com\/2016\/03\/16\/how-upper-and-lower-case-letters-changed-the-world\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How Upper and Lower Case Letters Changed the World<\/a> (ryanlanz.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most passwords are eight or less and 50% are names slang words dictionary words or trivial password 20% are from a pool of 5000 passwords<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,104,1096,140,2541,141,4,1844],"class_list":["post-1892","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-facebook","tag-fb","tag-imperva","tag-passwords","tag-rockyou","tag-security","tag-weak"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1892"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1892\/revisions"}],"predecessor-version":[{"id":129897,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1892\/revisions\/129897"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}