Slide 1

Slide 1 text

PASSWORD SECURITY Panggi Libersa Jasri Akadol Scientist at Veritrans Indonesia

Slide 2

Slide 2 text

Objective Agree that strong passwords and password practices contribute to protection of identity and privacy ! Discriminate passwords as weak or strong ! Recognize the role of passwords in authentication ! Recognize the relationship between authentication and both identity and privacy

Slide 3

Slide 3 text

Numbers

Slide 4

Slide 4 text

61% 54% 44% 89% 21% of consumers reuse passwords among multiple websites. of consumers only have five passwords or less. of consumers change their passwords only once a year or less. of consumers feel secure with their current password management and use habits. of consumers have had an online account compromised. source: http://www.csid.com/wp-content/uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf

Slide 5

Slide 5 text

Three fifths of internet users reuse passwords on multiple websites. 39% 61% Reuse Do not reuse

Slide 6

Slide 6 text

6% 5% 7% 28% 54% 1 - 5 6 - 10 11 - 15 16 - 20 20+ More than half of internet users have five passwords or less.

Slide 7

Slide 7 text

None of these Easy to enter Site Requirements Easy to remember Strength & Security 0 20 40 60 80 73 57 33 12 1 Strength is the top concern in password creation

Slide 8

Slide 8 text

8% 24% 12% 31% 20% 5% Once a week Once a month Once every 6 months Once a year Less than once a year Never 44% of internet users change their passwords only once a year or less.

Slide 9

Slide 9 text

Had malware steal passwords from computer Been tricked by phising sites to reveal passwords Had an online account compromised Had personal info stolen as result of company breach None of above 0 18 35 53 70 65 12 21 6 8 1 in 5 people has had an online account compromised

Slide 10

Slide 10 text

Passwords in the Context of Your Identity and Privacy

Slide 11

Slide 11 text

What is a password? “A password is information associated with an entity that confirms the entity’s identity.” Why are passwords needed? • Passwords are used for authentication • Authentication can be thought of as the act of linking yourself to your electronic identity within the system you are connecting to • Your password is used to verify to the system that you are the legitimate owner of the user/account identifier • Commonly referred to as “logging in”

Slide 12

Slide 12 text

Passwords/Identity/Privacy • Attackers who obtain your password can authenticate themselves on various systems and in turn … • Access your personal information (invade Your Privacy) • Impersonate you by acting on your behalf (steal Your Identity)

Slide 13

Slide 13 text

YourPassword Identity Privacy

Slide 14

Slide 14 text

Which of the following best describes the reason your password is easy to remember: ! A.based on common dictionary words B.based on common names C.based on user/account name D.is short (under 6 characters) QUIZ

Slide 15

Slide 15 text

Unfortunately, the characteristic you have selected also makes your password vulnerable to attack thus putting your Identity and Privacy at risk you are not alone

Slide 16

Slide 16 text

• based on common dictionary words • Including dictionary words that have been altered: • Reversed (e.g., “terces”) • Mixed case (e.g., SeCreT) • Words with vowels removed (e.g., “scrt”) • based on common names • based on user/account identifier • short (under 6 characters) • based on keyboard patterns (e.g., “qwerty”) • composed of single symbol type (e.g., all numbers) • are difficult for you to remember CHARACTERISTICS OF WEAK PASSWORDS

Slide 17

Slide 17 text

WEAK PASSWORD PRACTICES • recycling passwords • recording (writing down) passwords • use of previously recorded passwords (combination of above practices) • use of password on two or more systems/contexts • Especially risky when passwords are reused in low-trust systems (e.g., online gaming) since increased exposure

Slide 18

Slide 18 text

• contain at least one of each of the following: • digit (0..9) • letter (a..Z) • punctuation symbol (e.g., !) • are based on a verse (e.g., passphrase) • are easily remembered by you but very difficult (preferably impossible) for others to guess CHARACTERISTICS OF STRONG PASSWORDS

Slide 19

Slide 19 text

STRONG PASSWORD PRACTICES • never recycle passwords • never record (write down) a password anywhere • use a different password for each system/context • check for keyboard buffer devices/ software that intercept keystrokes (including password capture) • change password occasionally • change your password immediately if you suspect it has been “stolen”

Slide 20

Slide 20 text

DEMO

Slide 21

Slide 21 text

Self test

Slide 22

Slide 22 text

QUESTION 1 Strong passwords and password practices contribute to protection of identity and privacy. A. TRUE B. FALSE

Slide 23

Slide 23 text

strong passwords and password practices do contribute to protection of identity and privacy CORRECT!

Slide 24

Slide 24 text

QUESTION 2 Which pair contains both a weak and a strong password? A. cs101ra, ME11111 B. WYSIWYG, passwd C. ig*hh4, f9%Wfh D. kirk, on$7mur

Slide 25

Slide 25 text

cs101ra, ME11111 (weak, common), (weak, license #) ! WYSIWYG, passwd (weak, common acronym), (weak, common) ! ig*hh4, f9%Wfh (strong), (strong) ! kirk, on$7mur (weak, common name), (strong) CORRECT!

Slide 26

Slide 26 text

Recommendations

Slide 27

Slide 27 text

CONSUMER • DO use long passwords with a mix of letters, numbers and symbols. They are hardest to crack. Create passwords that are 10 characters or longer that include uppercase letters, lowercase letters, symbols and numbers. • DO use a unique password for each account and vary the email addresses you use for accounts. • DO NOT store your account information in an unsecured document on your computer or network. • DO NOT share your password — even with friends and family

Slide 28

Slide 28 text

BUSINESS • DO educate employees about the potential consequences for poor password habits, as well as proper password creation and management techniques. • DO consider compulsory education for passwords and understand the risk-to-cost ratio for implementing these protocols. • DO monitor employee credentials for compromise, and offer identity monitoring packages to employees and/or customers. • DO research and implement two-factor authentication techniques for online accounts. • DO have a plan in place in case of a company breach.

Slide 29

Slide 29 text

Thanks!