Password security, additional account protection methods

Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.

Рубрика Программирование, компьютеры и кибернетика
Вид статья
Язык английский
Дата добавления 20.03.2024
Размер файла 22,3 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

Kharkiv National University of Radio Electronics, Ukraine

Faculty of Computer Science

Password security, additional account protection methods

Luchenko Y.V.

Student

Semenova V.V.

Student

Summary

password multi-factor authentication

In this article, we consider the relevance of using passwords. To do this, we analyze current password statistics for recent years, look at methods of hacking accounts and how proper use of a password can protect against some of them. We also describe alternative methods of authentication and additional stages in multifactor authentication.

Keywords: password, authentication, authentication methods, password statistics, password cracking, multi-factor authentication, cyber security.

One of the first mentions of using a password dates back to the Roman Empire. Those who wanted to enter a certain closed area had to tell the guard the password. Passwords have become more common with the invention of computers and software development. The Collaborative Time Sharing System (CTSS) was the first operating system to use a password for login (1961). In the early 1970s, Robert Morris developed a system for storing login passwords in hashed form. Such a scheme is currently the most widespread. For modern people, using passwords has become a daily routine. Logins and passwords are used to enter the operating system of a computer, mobile phone, to connect to the wireless Internet, access personal accounts, etc.

It seems that creating a password is easy, but at the same time, many users create easy-to-crack passwords that affect their personal data or the data of the companies they work for. Thus, such large companies as eBay, LinkedIn and Facebook have already been affected by this. According to Digital Shadows Photon Research, 24.6 billion complete sets of usernames and passwords were stolen in 2022 [1 ]. According to Verizon, 80% of data breaches involve passwords [2].

Despite the relative security of passwords, they are affected by the human element - 85% of data breaches involved a human element such as phishing, stolen credentials, and human error [2]. For some people, the convenience of using a password is in the first place, so they make mistakes when creating them. This applies to the use of both simple popular passwords and hackable patterns. The most popular passwords for 2022 are presented below (table 1).

Table 1. Most popular passwords for 2022

Rank

Password

Time to crack

Count

1

password

< 1 Second

4,929,113

2

123456

< 1 Second

1,523,537

3

123456789

< 1 Second

413,056

4

guest

10 Seconds

376,417

5

qwerty

< 1 Second

309,679

6

12345678

< 1 Second

284,946

7

111111

< 1 Second

229,047

8

12345

< 1 Second

188,602

9

col123456

11 Seconds

140,505

10

123123

< 1 Second

127,762

taken from the NordPass website [3]

The following are statistics that illustrate how the human element affects the creation of passwords and, as a result, their security. Passwords often contain information that can be found in the public domain:

15% of people use their own first name in their password [4];

21 % of passwords include the user's birth year [4];

18% of passwords include the name of the user's pet [4];

37% of respondents have used their employer's name in a work-related password [5].

Also, problems may arise not with the password itself, but with its reuse and rare change:

62.9% of online users change their passwords only when prompted [6];

Even though 92% of people know that using a variation of the same password is a risk, 65% always or mostly use the same password or a variation [7];

Employees reuse a password an average of 13 times [8];

45% of survey respondents did not change their passwords in the past year even after a breach had occurred [7].

The password provides access to private data, so only the account owner should know the password, but statistically 49% of IT security professionals and 51% of individuals share passwords with colleagues to access business accounts [9].

At the same time, according to the rules, passwords must be long enough (from 12, and preferably 16 characters)[10], include characters of different types and impossible to guess based on public information about the user.

Adherence to the rules of password construction help protect against some types of attacks, such as:

Brute force attack;

Dictionary attack.

Below is information on how quickly it is possible to brute force passwords of different lengths and with different types of characters (table 2).

Table 2. Time it takes a hacker to brute force password in 2022

Number of Characters

Numbers Only

Lowercase Letters

Upper and Lowercase Letters

Numbers, Upper and Lowercase Letters

Numbers, Upper and Lowercase Letters, Symbols

4

Instantly

Instantly

Instantly

Instantly

Instantly

5

Instantly

Instantly

Instantly

Instantly

Instantly

6

Instantly

Instantly

Instantly

Instantly

Instantly

7

Instantly

Instantly

2 secs

7 secs

31 secs

8

Instantly

Instantly

2 mins

7 mins

39 mins

9

Instantly

10 secs

1 hours

7 hours

2 days

10

Instantly

4 mins

3 days

3 weeks

5 months

11

Instantly

2 hours

5 months

3 years

34 years

12

2 secs

2 days

24 years

200 years

3 k years

13

19 secs

2 months

1k years

12k years

202 years

14

3 mins

4 years

64k years

750k years

16m years

15

32 mins

100 years

3 m years

46m years

1bn years

16

5 hours

3 k years

173 m years

3bn years

92bn years

17

2 days

69 k years

9bn years

179bn years

7tn years

18

3 weeks

2 m years

467bn years

11tnyears

438tn years

taken from the Hive Systems website [11]

There are attacks that do not depend on the content of the password:

Shoulder surfing;

Key Logging;

Phishing;

Replay attack (reflection attack).

Statistics show that the percentage of easy-to-crack passwords is significant. So, the question arises: "Are passwords still the best method of authentication?".

To answer this question, alternative authentication methods should be considered. These include:

Certificate-based authentication;

Biometric authentication;

Single sign-on (SSO).

Certificate-based authentication technology uses certificate files. A certificate is an electronic document that identifies the user and is provided by a third party (certification center). The certificate contains information for user identification - the public key, the name of the digital signature algorithm, the name of the certification center and the validity period. For certificate-based authentication, the user must provide his certificate, then identity verification is performed using a private key. This authentication method uses long keys that provide a sufficient level of protection. From the user's point of view, it requires the creation of a certificate file and its constant updating when it expires.

Biometric authentication works by comparing the provided data with verified user information stored in a database. There are two types of biometrics: conventional (DNA, fingerprints, retina) and behavioral (touchscreen use, typing dynamics, mouse activity). Behavioral biometrics reflect the user's behavioral habits when using devices. Biometric authentication is more secure than passwords because biometric data cannot be found in the public domain. At the same time, hackers can use a presentation attack - make silicone fingerprints, use photos to create a 3D mask, or record user activity.

Single sign-on uses a third party for authentication. It can be a social network like Google, Facebook, etc. When using this authentication method, the verification of the user's identity is performed by a third party. This is convenient for the user because he does not need to create a separate password for a new account. On the other hand, if an attacker gets access to this account, then all the records for which SSO is used will be at risk.

At the same time, with the advent of alternative authentication methods, password authentication is also improving. All of them are based on multi-factor authentication. Most often, it consists of two stages (two-factor authentication). Examples of the second stage are:

SMS or email code;

Token;

Transaction.

SMS or email code is the most common option for the second stage of authentication. A notification with a generated one-time code comes to the phone or email. Phone or e-mail is indicated during registration.

Token is another option. It can be a disk, flash drive or card. In this case, an interface for reading data from this medium should be provided. Other types of tokens involve the use of additional devices or applications on mobile devices.

The transactional authentication method compares the user's characteristics with what it knows about the user and looks for discrepancies. Thus, it always casts doubt on whether the user actually owns the account. If discrepancies appear, this triggers additional verification steps. For example, this applies to a new IP address for the account.

Therefore, taking into account the peculiarities of alternative authentication methods, they either require preliminary preparations, additional equipment, or are dependent on other accounts. Their use makes sense, but despite the weaknesses of passwords, there are currently no alternatives that can completely replace them. It should also be noted that passwords do not require additional hardware, so their implementation is simple and convenient for developers. It follows that multi-factor authentication is currently the most relevant method of authentication. It is both simple to create and quite safe. Using multi-factor authentication makes account 99.9% less likely to be compromised [12].

Conclusion

In this article, we substantiated the importance of creating a good password, a mistake in its creation can cost the user personal and work data. In addition, we considered modern methods of password cracking, provided relevant statistics. We have come to the conclusion that the password is still a valid method of authentication, but it has some problems. As a solution to the fact that in some situations a password does not protect against data leakage, we provide alternative authentication methods. The combined use of these methods and a password makes the protection of user data from attackers more reliable.

References

1. Account Takeover in 2022. (n.d.). Resources.digitalshadows.com. Retrieved January 10, 2023, from https://resources.digitalshadows.com/whitepapers-and-reports/account-takeover-in-2022.

2. Verizon. (2022). 2022 Data Breach Investigations Report. Verizon Business. https://www.verizon.com/business/resources/reports/dbir/.

3. NordPass. (2021). Most common passwords of 2020. Nordpass.com. https://nordpass.com/most-common-passwords-list/.

4. Security.org Team. (2021, October 1). America's Password Habits 2021. Security.org. https://www.security.org/resources/online-password-strategies/.

5. Workplace Password Malpractice Report | Keeper Security. (n.d.).

6. Www.keepersecurity.com. Retrieved January 10, 2023, from https://www.keepersecurity.com/resources/workplace-password-habits.html.

7. Top Password Strengths and Vulnerabilities: Threats, Preventive Measures, and Recoveries. (n.d.). Www.goodfirms.co. https://www.goodfirms.co/resources/top-password-strengths-and-vulnerabilities.

8. Psychology of Passwords. (n.d.). https://www.lastpass.com//-/media/9fe0bf5dc473413b8ab4df3bd8688295.pdf.

9. THE 3RD ANNUAL GLOBAL PASSWORD SECURITY REPORT. (n.d.). https://lp-cdn.lastpass.com/lporcamedia/document-library/lastpass/pdf/en/LMI0828a-IAM-LastPass-State-of-the-Password-Report.pdf.

10. The 2020 State of Password and Authentication Security Behaviors Report. (2020). https://www.nass.org/sites/default/files/2020-04/Yubico%20Report%20Ponemon%202020%20State%20of%20Password%20and%2 0Authentication%20Security%20Behaviors.pdf.

11. Delahaye, J.-P. (2019, April 12). The Mathematics of (Hacking) Passwords. Scientific American. https://www.scientificamerican.com/article/the-mathematics-of-hacking-passwords/.

12. Hive Systems Password Table. (n.d.). Hive Systems. https://www.hivesystems.io/password-table.

13. Weinert, A. (2019, July 9). Your Pa$$word doesn't matter [Review of Your Pa$$word doesn't matter]. TECHCOMMUNITY.MICROSOFT.COM.

14. https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/your-pa-word-doesn-t-matter/ba-p/731984.

Размещено на Allbest.ru

...

Подобные документы

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • Разработка алгоритмов на персональном компьютере, среда Турбо Паскаль. Работа программы для шифровки и дешифровки текста. Алгоритм шифрования: с помощью команды ORD. Функция Password а преобразовании символа, введенного пользователем ключа в его числовой

    курсовая работа [19,6 K], добавлен 17.10.2008

  • Определение энтропии как меры стойкости паролей, способ противодействия их взлому. Вычисление веса и информационной емкости пароля с помощью SeaMonkey, Password Strength Tester. Алгоритм работы дежурного и вспомогательного анализаторов от Microsoft.

    курсовая работа [632,8 K], добавлен 18.06.2011

  • Data mining, developmental history of data mining and knowledge discovery. Technological elements and methods of data mining. Steps in knowledge discovery. Change and deviation detection. Related disciplines, information retrieval and text extraction.

    доклад [25,3 K], добавлен 16.06.2012

  • Technical methods of supporting. Analysis of airplane accidents. Growth in air traffic. Drop in aircraft accident rates. Causes of accidents. Dispatcher action scripts for emergency situations. Practical implementation of the interface training program.

    курсовая работа [334,7 K], добавлен 19.04.2016

  • Technical and economic characteristics of medical institutions. Development of an automation project. Justification of the methods of calculating cost-effectiveness. General information about health and organization safety. Providing electrical safety.

    дипломная работа [3,7 M], добавлен 14.05.2014

  • Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.

    лабораторная работа [3,2 M], добавлен 09.04.2016

  • Понятие и виды Web-хостинга. Анализ рынка хостинговых компаний. Языки Web-программирования: HTML, PHP, Water, Clear Methods Steam. Web-дизайн и браузеры. Возможности современных визуальных HTML-редакторов. Создание сайта "Каталога хостинговых компаний".

    курсовая работа [537,6 K], добавлен 15.01.2012

  • A database is a store where information is kept in an organized way. Data structures consist of pointers, strings, arrays, stacks, static and dynamic data structures. A list is a set of data items stored in some order. Methods of construction of a trees.

    топик [19,0 K], добавлен 29.06.2009

  • IS management standards development. The national peculiarities of the IS management standards. The most integrated existent IS management solution. General description of the ISS model. Application of semi-Markov processes in ISS state description.

    дипломная работа [2,2 M], добавлен 28.10.2011

  • История интегрированной среды разработки, версии Delphi. Организация библиотеки компонентов. Страница Additional, ряд часто используемых компонентов общего назначения. Исполняемый файл программы "Архиватор текстовых файлов", интерфейс приложения.

    курсовая работа [1019,0 K], добавлен 16.05.2017

  • NANO Security - сплоченная команда молодых специалистов: программистов, аналитиков, тестировщиков, менеджеров. Предметная область, назначение разработки, требования к программному изделию, системы управления обучением. Обзор языков программирования.

    отчет по практике [1,1 M], добавлен 22.07.2012

  • Интегрированная среда разработки Lazarus. Среда программных продуктов Lazarus, объекты программных компонентов. Палитра компонентов Standard, Additional. Разработка справочной системы: структура проекта, интерфейс программы, компоненты приложения.

    курсовая работа [695,2 K], добавлен 08.01.2023

  • Description of a program for building routes through sidewalks in Moscow taking into account quality of the road surface. Guidelines of working with maps. Technical requirements for the program, user interface of master. Dispay rated pedestrian areas.

    реферат [3,5 M], добавлен 22.01.2016

  • Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute

    презентация [203,5 K], добавлен 08.12.2014

  • Overview history of company and structure of organization. Characterization of complex tasks and necessity of automation. Database specifications and system security. The calculation of economic efficiency of the project. Safety measures during work.

    дипломная работа [1009,6 K], добавлен 09.03.2015

  • Сравнительная характеристика антивирусных программ. Фирма-разработчик и характеристика программы Eset Smart Security, форма продажи лицензий и структура модулей защиты информации. Назначение утилиты Eset SysInspector. Правила корректного обновления.

    контрольная работа [28,8 K], добавлен 10.03.2011

  • Классификация вирусов, методы защиты от них. Виды и типы антивирусных программ. Антивирус Kaspersky Internet Security 2012, компоненты защиты и мониторинг сети, достоинства. Динамика изменения возможностей антивирусов по лечению активного заражения.

    курсовая работа [467,8 K], добавлен 06.09.2013

  • Обзор рынка программных продуктов по управлению аудиторией. Анализ системы Sanako Study 500. Ее тестирование на примере дисциплины "Системное программное обеспечение и язык программирования Ассемблер". Расчёт экономической эффективности от его внедрения.

    дипломная работа [2,0 M], добавлен 04.06.2012

  • Базовые характеристики агента, требования к программированию. Особенности архитектуры, организуемой в виде нескольких уровней, представляющих разные функциональные характеристики. Проблемы многоагентных систем при реализации идеи коллективного поведения.

    презентация [255,2 K], добавлен 25.06.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.