Password security, additional account protection methods
Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
Рубрика | Программирование, компьютеры и кибернетика |
Вид | статья |
Язык | английский |
Дата добавления | 20.03.2024 |
Размер файла | 22,3 K |
Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже
Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.
Размещено на http://www.allbest.ru/
Kharkiv National University of Radio Electronics, Ukraine
Faculty of Computer Science
Password security, additional account protection methods
Luchenko Y.V.
Student
Semenova V.V.
Student
Summary
password multi-factor authentication
In this article, we consider the relevance of using passwords. To do this, we analyze current password statistics for recent years, look at methods of hacking accounts and how proper use of a password can protect against some of them. We also describe alternative methods of authentication and additional stages in multifactor authentication.
Keywords: password, authentication, authentication methods, password statistics, password cracking, multi-factor authentication, cyber security.
One of the first mentions of using a password dates back to the Roman Empire. Those who wanted to enter a certain closed area had to tell the guard the password. Passwords have become more common with the invention of computers and software development. The Collaborative Time Sharing System (CTSS) was the first operating system to use a password for login (1961). In the early 1970s, Robert Morris developed a system for storing login passwords in hashed form. Such a scheme is currently the most widespread. For modern people, using passwords has become a daily routine. Logins and passwords are used to enter the operating system of a computer, mobile phone, to connect to the wireless Internet, access personal accounts, etc.
It seems that creating a password is easy, but at the same time, many users create easy-to-crack passwords that affect their personal data or the data of the companies they work for. Thus, such large companies as eBay, LinkedIn and Facebook have already been affected by this. According to Digital Shadows Photon Research, 24.6 billion complete sets of usernames and passwords were stolen in 2022 [1 ]. According to Verizon, 80% of data breaches involve passwords [2].
Despite the relative security of passwords, they are affected by the human element - 85% of data breaches involved a human element such as phishing, stolen credentials, and human error [2]. For some people, the convenience of using a password is in the first place, so they make mistakes when creating them. This applies to the use of both simple popular passwords and hackable patterns. The most popular passwords for 2022 are presented below (table 1).
Table 1. Most popular passwords for 2022
Rank |
Password |
Time to crack |
Count |
|
1 |
password |
< 1 Second |
4,929,113 |
|
2 |
123456 |
< 1 Second |
1,523,537 |
|
3 |
123456789 |
< 1 Second |
413,056 |
|
4 |
guest |
10 Seconds |
376,417 |
|
5 |
qwerty |
< 1 Second |
309,679 |
|
6 |
12345678 |
< 1 Second |
284,946 |
|
7 |
111111 |
< 1 Second |
229,047 |
|
8 |
12345 |
< 1 Second |
188,602 |
|
9 |
col123456 |
11 Seconds |
140,505 |
|
10 |
123123 |
< 1 Second |
127,762 |
taken from the NordPass website [3]
The following are statistics that illustrate how the human element affects the creation of passwords and, as a result, their security. Passwords often contain information that can be found in the public domain:
15% of people use their own first name in their password [4];
21 % of passwords include the user's birth year [4];
18% of passwords include the name of the user's pet [4];
37% of respondents have used their employer's name in a work-related password [5].
Also, problems may arise not with the password itself, but with its reuse and rare change:
62.9% of online users change their passwords only when prompted [6];
Even though 92% of people know that using a variation of the same password is a risk, 65% always or mostly use the same password or a variation [7];
Employees reuse a password an average of 13 times [8];
45% of survey respondents did not change their passwords in the past year even after a breach had occurred [7].
The password provides access to private data, so only the account owner should know the password, but statistically 49% of IT security professionals and 51% of individuals share passwords with colleagues to access business accounts [9].
At the same time, according to the rules, passwords must be long enough (from 12, and preferably 16 characters)[10], include characters of different types and impossible to guess based on public information about the user.
Adherence to the rules of password construction help protect against some types of attacks, such as:
Brute force attack;
Dictionary attack.
Below is information on how quickly it is possible to brute force passwords of different lengths and with different types of characters (table 2).
Table 2. Time it takes a hacker to brute force password in 2022
Number of Characters |
Numbers Only |
Lowercase Letters |
Upper and Lowercase Letters |
Numbers, Upper and Lowercase Letters |
Numbers, Upper and Lowercase Letters, Symbols |
|
4 |
Instantly |
Instantly |
Instantly |
Instantly |
Instantly |
|
5 |
Instantly |
Instantly |
Instantly |
Instantly |
Instantly |
|
6 |
Instantly |
Instantly |
Instantly |
Instantly |
Instantly |
|
7 |
Instantly |
Instantly |
2 secs |
7 secs |
31 secs |
|
8 |
Instantly |
Instantly |
2 mins |
7 mins |
39 mins |
|
9 |
Instantly |
10 secs |
1 hours |
7 hours |
2 days |
|
10 |
Instantly |
4 mins |
3 days |
3 weeks |
5 months |
|
11 |
Instantly |
2 hours |
5 months |
3 years |
34 years |
|
12 |
2 secs |
2 days |
24 years |
200 years |
3 k years |
|
13 |
19 secs |
2 months |
1k years |
12k years |
202 years |
|
14 |
3 mins |
4 years |
64k years |
750k years |
16m years |
|
15 |
32 mins |
100 years |
3 m years |
46m years |
1bn years |
|
16 |
5 hours |
3 k years |
173 m years |
3bn years |
92bn years |
|
17 |
2 days |
69 k years |
9bn years |
179bn years |
7tn years |
|
18 |
3 weeks |
2 m years |
467bn years |
11tnyears |
438tn years |
taken from the Hive Systems website [11]
There are attacks that do not depend on the content of the password:
Shoulder surfing;
Key Logging;
Phishing;
Replay attack (reflection attack).
Statistics show that the percentage of easy-to-crack passwords is significant. So, the question arises: "Are passwords still the best method of authentication?".
To answer this question, alternative authentication methods should be considered. These include:
Certificate-based authentication;
Biometric authentication;
Single sign-on (SSO).
Certificate-based authentication technology uses certificate files. A certificate is an electronic document that identifies the user and is provided by a third party (certification center). The certificate contains information for user identification - the public key, the name of the digital signature algorithm, the name of the certification center and the validity period. For certificate-based authentication, the user must provide his certificate, then identity verification is performed using a private key. This authentication method uses long keys that provide a sufficient level of protection. From the user's point of view, it requires the creation of a certificate file and its constant updating when it expires.
Biometric authentication works by comparing the provided data with verified user information stored in a database. There are two types of biometrics: conventional (DNA, fingerprints, retina) and behavioral (touchscreen use, typing dynamics, mouse activity). Behavioral biometrics reflect the user's behavioral habits when using devices. Biometric authentication is more secure than passwords because biometric data cannot be found in the public domain. At the same time, hackers can use a presentation attack - make silicone fingerprints, use photos to create a 3D mask, or record user activity.
Single sign-on uses a third party for authentication. It can be a social network like Google, Facebook, etc. When using this authentication method, the verification of the user's identity is performed by a third party. This is convenient for the user because he does not need to create a separate password for a new account. On the other hand, if an attacker gets access to this account, then all the records for which SSO is used will be at risk.
At the same time, with the advent of alternative authentication methods, password authentication is also improving. All of them are based on multi-factor authentication. Most often, it consists of two stages (two-factor authentication). Examples of the second stage are:
SMS or email code;
Token;
Transaction.
SMS or email code is the most common option for the second stage of authentication. A notification with a generated one-time code comes to the phone or email. Phone or e-mail is indicated during registration.
Token is another option. It can be a disk, flash drive or card. In this case, an interface for reading data from this medium should be provided. Other types of tokens involve the use of additional devices or applications on mobile devices.
The transactional authentication method compares the user's characteristics with what it knows about the user and looks for discrepancies. Thus, it always casts doubt on whether the user actually owns the account. If discrepancies appear, this triggers additional verification steps. For example, this applies to a new IP address for the account.
Therefore, taking into account the peculiarities of alternative authentication methods, they either require preliminary preparations, additional equipment, or are dependent on other accounts. Their use makes sense, but despite the weaknesses of passwords, there are currently no alternatives that can completely replace them. It should also be noted that passwords do not require additional hardware, so their implementation is simple and convenient for developers. It follows that multi-factor authentication is currently the most relevant method of authentication. It is both simple to create and quite safe. Using multi-factor authentication makes account 99.9% less likely to be compromised [12].
Conclusion
In this article, we substantiated the importance of creating a good password, a mistake in its creation can cost the user personal and work data. In addition, we considered modern methods of password cracking, provided relevant statistics. We have come to the conclusion that the password is still a valid method of authentication, but it has some problems. As a solution to the fact that in some situations a password does not protect against data leakage, we provide alternative authentication methods. The combined use of these methods and a password makes the protection of user data from attackers more reliable.
References
1. Account Takeover in 2022. (n.d.). Resources.digitalshadows.com. Retrieved January 10, 2023, from https://resources.digitalshadows.com/whitepapers-and-reports/account-takeover-in-2022.
2. Verizon. (2022). 2022 Data Breach Investigations Report. Verizon Business. https://www.verizon.com/business/resources/reports/dbir/.
3. NordPass. (2021). Most common passwords of 2020. Nordpass.com. https://nordpass.com/most-common-passwords-list/.
4. Security.org Team. (2021, October 1). America's Password Habits 2021. Security.org. https://www.security.org/resources/online-password-strategies/.
5. Workplace Password Malpractice Report | Keeper Security. (n.d.).
6. Www.keepersecurity.com. Retrieved January 10, 2023, from https://www.keepersecurity.com/resources/workplace-password-habits.html.
7. Top Password Strengths and Vulnerabilities: Threats, Preventive Measures, and Recoveries. (n.d.). Www.goodfirms.co. https://www.goodfirms.co/resources/top-password-strengths-and-vulnerabilities.
8. Psychology of Passwords. (n.d.). https://www.lastpass.com//-/media/9fe0bf5dc473413b8ab4df3bd8688295.pdf.
9. THE 3RD ANNUAL GLOBAL PASSWORD SECURITY REPORT. (n.d.). https://lp-cdn.lastpass.com/lporcamedia/document-library/lastpass/pdf/en/LMI0828a-IAM-LastPass-State-of-the-Password-Report.pdf.
10. The 2020 State of Password and Authentication Security Behaviors Report. (2020). https://www.nass.org/sites/default/files/2020-04/Yubico%20Report%20Ponemon%202020%20State%20of%20Password%20and%2 0Authentication%20Security%20Behaviors.pdf.
11. Delahaye, J.-P. (2019, April 12). The Mathematics of (Hacking) Passwords. Scientific American. https://www.scientificamerican.com/article/the-mathematics-of-hacking-passwords/.
12. Hive Systems Password Table. (n.d.). Hive Systems. https://www.hivesystems.io/password-table.
13. Weinert, A. (2019, July 9). Your Pa$$word doesn't matter [Review of Your Pa$$word doesn't matter]. TECHCOMMUNITY.MICROSOFT.COM.
14. https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/your-pa-word-doesn-t-matter/ba-p/731984.
Размещено на Allbest.ru
...Подобные документы
Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.
реферат [20,9 K], добавлен 19.12.2013Разработка алгоритмов на персональном компьютере, среда Турбо Паскаль. Работа программы для шифровки и дешифровки текста. Алгоритм шифрования: с помощью команды ORD. Функция Password а преобразовании символа, введенного пользователем ключа в его числовой
курсовая работа [19,6 K], добавлен 17.10.2008Определение энтропии как меры стойкости паролей, способ противодействия их взлому. Вычисление веса и информационной емкости пароля с помощью SeaMonkey, Password Strength Tester. Алгоритм работы дежурного и вспомогательного анализаторов от Microsoft.
курсовая работа [632,8 K], добавлен 18.06.2011Data mining, developmental history of data mining and knowledge discovery. Technological elements and methods of data mining. Steps in knowledge discovery. Change and deviation detection. Related disciplines, information retrieval and text extraction.
доклад [25,3 K], добавлен 16.06.2012Technical methods of supporting. Analysis of airplane accidents. Growth in air traffic. Drop in aircraft accident rates. Causes of accidents. Dispatcher action scripts for emergency situations. Practical implementation of the interface training program.
курсовая работа [334,7 K], добавлен 19.04.2016Technical and economic characteristics of medical institutions. Development of an automation project. Justification of the methods of calculating cost-effectiveness. General information about health and organization safety. Providing electrical safety.
дипломная работа [3,7 M], добавлен 14.05.2014Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.
лабораторная работа [3,2 M], добавлен 09.04.2016Понятие и виды Web-хостинга. Анализ рынка хостинговых компаний. Языки Web-программирования: HTML, PHP, Water, Clear Methods Steam. Web-дизайн и браузеры. Возможности современных визуальных HTML-редакторов. Создание сайта "Каталога хостинговых компаний".
курсовая работа [537,6 K], добавлен 15.01.2012A database is a store where information is kept in an organized way. Data structures consist of pointers, strings, arrays, stacks, static and dynamic data structures. A list is a set of data items stored in some order. Methods of construction of a trees.
топик [19,0 K], добавлен 29.06.2009IS management standards development. The national peculiarities of the IS management standards. The most integrated existent IS management solution. General description of the ISS model. Application of semi-Markov processes in ISS state description.
дипломная работа [2,2 M], добавлен 28.10.2011История интегрированной среды разработки, версии Delphi. Организация библиотеки компонентов. Страница Additional, ряд часто используемых компонентов общего назначения. Исполняемый файл программы "Архиватор текстовых файлов", интерфейс приложения.
курсовая работа [1019,0 K], добавлен 16.05.2017NANO Security - сплоченная команда молодых специалистов: программистов, аналитиков, тестировщиков, менеджеров. Предметная область, назначение разработки, требования к программному изделию, системы управления обучением. Обзор языков программирования.
отчет по практике [1,1 M], добавлен 22.07.2012Интегрированная среда разработки Lazarus. Среда программных продуктов Lazarus, объекты программных компонентов. Палитра компонентов Standard, Additional. Разработка справочной системы: структура проекта, интерфейс программы, компоненты приложения.
курсовая работа [695,2 K], добавлен 08.01.2023Description of a program for building routes through sidewalks in Moscow taking into account quality of the road surface. Guidelines of working with maps. Technical requirements for the program, user interface of master. Dispay rated pedestrian areas.
реферат [3,5 M], добавлен 22.01.2016Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute
презентация [203,5 K], добавлен 08.12.2014Overview history of company and structure of organization. Characterization of complex tasks and necessity of automation. Database specifications and system security. The calculation of economic efficiency of the project. Safety measures during work.
дипломная работа [1009,6 K], добавлен 09.03.2015Сравнительная характеристика антивирусных программ. Фирма-разработчик и характеристика программы Eset Smart Security, форма продажи лицензий и структура модулей защиты информации. Назначение утилиты Eset SysInspector. Правила корректного обновления.
контрольная работа [28,8 K], добавлен 10.03.2011Классификация вирусов, методы защиты от них. Виды и типы антивирусных программ. Антивирус Kaspersky Internet Security 2012, компоненты защиты и мониторинг сети, достоинства. Динамика изменения возможностей антивирусов по лечению активного заражения.
курсовая работа [467,8 K], добавлен 06.09.2013Обзор рынка программных продуктов по управлению аудиторией. Анализ системы Sanako Study 500. Ее тестирование на примере дисциплины "Системное программное обеспечение и язык программирования Ассемблер". Расчёт экономической эффективности от его внедрения.
дипломная работа [2,0 M], добавлен 04.06.2012Базовые характеристики агента, требования к программированию. Особенности архитектуры, организуемой в виде нескольких уровней, представляющих разные функциональные характеристики. Проблемы многоагентных систем при реализации идеи коллективного поведения.
презентация [255,2 K], добавлен 25.06.2013