SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Downloaden Sie, um offline zu lesen
H o w To D e s i g n
pA55w0rDs:-)petercochrane.com
ABC12345def
Prof Peter Cochrane OBE
Sentient Systems
THE nIGHTMARE!
*A different password for each account
*Change your passwords regularly
*Don’t keep a documented record
*Don’t embed them in a browser
*Don’t write them down
*Don’t tell anyone
*Don’t share
Guidelines and lots of useful advice
that is often impractical and/or
impossible:-
Make them > 11 characters that include
a mix of alpha numerics - upper & lower
case plus punctuation marks and special
characters…
Public Reality!
A fundamental incapability to deal &
cope with the complexities and many
challenges of IT…
Industry needs to produce, deliver and
maintain inherently secure products - to
get the users out of the Realm of Risk
management, including password hell!
OMG - Really !
YES, people are indeed silly
We need to do
much better
than this!
THE Threat
Omnipresent
Highly motivated
Growing by the day
Smart
Adaptive
Resourceful
Well organised
Global
24 x 7
People
Machines
Networks
AI, Apps, Clouds
+++
“Never
underestimate
the enemy - and never
. assume you are smarter
than they are”
Passwords in ‘diaries’
Passwords in ‘eMails’
Passwords on ‘post its’
Passwords in ‘open docs’
Passwords on ‘white boards’
Passwords shared ‘between apps’
Passwords shared ‘between peoples’
Passwords shared ‘between web sites’
Passwords used on spoof web sites/services
+++++
The Gullibility Threat
Social engineering - persuasion - observation - bribes ++
Passwords extracted by ‘smart’ conversationalists,
friends, family, associates, colleagues, co-workers ++++
Welcome to password &
two factor hell!
We need to do
much better
than this!
What do you do when
there is no mobile signal
or there’s a loooong
delay or network fault?
You need at least: a net
sync’d app embedded on
your machine, but ensure
it does it imply more risk?
12 Characters, Minimum: There’s no minimum or standardised password
length; but in general go for >12 to 14 characters
Mix Numbers: Letters, Symbols, Upper & Lower-Case: Many different types
makes passwords harder to crack
Dictionary Words/Combination: To be avoided as much as possible - any
isolated word is bad, and word combinations are also high risk
Avoid Obvious Substitutions: Eg, replacing an ‘o’ with ‘0’ is obvious - a 3 for e
or E, 2 for z or Z only slightly better - and DO use “, ; -} ] ) et al
Number Strings: at the end, beginning or in the middle are also ‘obvious’
Industry Advice
For a strong password you ‘at least’ need..
12 Characters, Minimum: There’s no minimum or standardised password
length; but in general go for >12 to 14 characters
Mix Numbers: Letters, Symbols, Upper & Lower-Case: Many different types
makes passwords harder to crack
Dictionary Words/Combination: To be avoided as much as possible - any
isolated word is bad, and word combinations are also high risk
Avoid Obvious Substitutions: Eg, replacing an ‘o’ with ‘0’ is obvious - a 3 for e
or E, 2 for z or Z only slightly better - and DO use “, ; -} ] ) et al
Number Strings: at the end, beginning or in the middle are also ‘obvious’
Industry Advice
For a strong password you ‘at least’ need..
Machines are fast
intelligent exhaustive
with extensive libraries
One size does not fit all
people and machines
present different risks
people are slow and
get exhausted and
use different methods
For a strong password you ‘at least’ need..
The snag is you are one click away from losing everything!
And so another much bigger security fail/fail pops up and kills you stone dead!
“The secret to good security is to design (in) ‘fail-safe’ and ‘fail-gracefully’ with
‘layered’
protection and multiple routes to recovery
“All your ‘eggs’ in one basket is the dumbest and riskiest solution of all “
Strong Advice
A password generator and management system
Password Managers
D e l e g a t i n g t h e n i g h t m a r e t o m a c h i n e s
Mostly Software embedded in browser plugins/web services to automatically
manage user credentials
They auto-paste (names/ID/email addresses) passwords into login forms, or
simulate typing them, and generally support:
•Printable characters
•Passwords >64 characters
•Pasting username and password
Password Managers
D e l e g a t i n g t h e n i g h t m a r e t o m a c h i n e s
Mostly Software embedded in browser plugins/web services to automatically
manage user credentials
They auto-paste (names/ID/email addresses) passwords into login forms, or
simulate typing them, and generally support:
•Printable characters
•Passwords >64 characters
•Pasting username and password
don’t
rely
on
one
app
alone
m
ake
sure
you
engage
a
degree
of
diversity
Password Managers
D e l e g a t i n g t h e c o m p l e x i t y t o m a c h i n e s
Also, choose embedded password generators with many user choices:-
Length
Upper Case
Lower Case
Numbers
Symbols
Special Characters
Similar Characters
Generate on Device
Generate on Server
Auto-Select
New Password
https://digital.com/blog/best-strong-password-generators/
Password Managers
W h y y o u n e e d / s h o u l d a l w a y s u s e o n e !
W h a t c o u l d p o s s i b l y g o w r o n g ?
•Yo u r d e v i c e / m a c h i n e i s s t o l e n / b r o k e n / f a i l s / d i e s
•A s o f t w a r e u p g r a d e s c r a m b l e s e v e r y t h i n g
•Yo u r b a c k u p / r e c o v e r y p r o c e s s f a i l s
•M a l w a r e f r e e z e s e v e r y t h i n g
•T h e A p p / B r o w s e r f a i l s
………………..
REALITY CHECK
Diversity-essential to survival
Confounding the enemy by the
reduction of habituality - and
the introduction of the new,
unexpected, surprises, and
a reduction of discernible
patterns…
At best you will
prevent a break
in, and at worst
you should slow
and impede the
Dark Side to
cost them time
and $$$$
Vary your methods
and measures as
much/frequently
as is reasonably
possible. Maximise
the total Entropy
of your defences
REALITY CHECK
Diversity-essential to survival
Beware of ‘Common Mode Failures’ due to an
over reliance on one technology choice/route,
or by being blind sided and/or overconfident in
you choices, products, and engineering
solutions.
“Fortresses tend to remain relatively static
whilst methods of attack always evolve”
Get someone to attack and test your defences
and solution(s)…never be so sure that you got it
all right first time around…or indeed that it all
exhibits longevity!
Use a password and/or document/
file/folder encryption…
Strongest Advice
For protected documents that may be accessed
The concatenation by layers can add exponential
difficulty for any attacker
Obscuration by volume and location is also an
effective mode of protection
Password protect at every layer
Strongest Advice
Use every weapon of defence you have available
Do not rely on any one technique
Respond rapidly to surprises
Be prepared to be adaptive
Use all available options
Keep on top of new attack
technologies - adapt and
evolve on the fly…
CrEating your own
Making life very difficult for The Dark Side
IcannaTellythee
Thi5i5th3b35tIcand0
Non-standard/Novel solutions can be hard/expensive to defeat
Degrees of Freedom
Exploiting as many as possible @ the same time
26 Letters - Lower Case
26 Letters - Upper Case
10 Digits
36 Other } 96 Options per password character
Password Entropy
The more disorder the harder it is to crack
Password Entropy = log2(Nn
) = n log2(N)
Where N = Number of character options (ie ~96 for standard QWERTY keyboard)
And n = Number of characters in the password
Recognisable words and phrases + repeated characters +
similar characters represent degrees of order that increase
the likelihood that a password will be cracked.
The bigger the Entropy/Disorder the stronger the password!
Dominant Component
T h e e n t r o p y o r d e r / d i s o r d e r b r e a k p o i n t
Password Entropy = n log2(N)
The ‘breakpoint’ is at n = log2(N)
ie the password length ’n’ overtakes the number of possible character
states ’N’ as the dominant factor
All ‘viable’ passwords lie in the range n >> log2(N)
viable length
F o r a g i v e n a p p / p r o t e c t i o n
In the proximity of the break point:
N = 10 then   n > 3 = 104
symbol states <<< 1s (n = 4)
N = 26 n > 4 = 1.2 x 107
<< 1s (n = 5)
N = 52 n > 5 = 1.2 x 1010
< 1s (n = 6)
N = 62 n > 5 = 5.7 x1010
< 1m (n = 6)
N = 98 n > 6 = 8.7 x1013
< 10m (n = 7)
Relative
Computing Time
to Crack
Ball Park Guide
The entropy order/disorder breakpoint
Password Length/Strength experience to 2019:
4 = Very Weak - puts you at risk
5 = Weak - just about OK for device password
8 = Fairly Strong for secure network access passwords
10 = Strong for secure access to company websites and data
16 = Very Strong for securing commercial and financial data access
22+ = Hyper Secure for encryption
While a password with ~50 bits may be deemed ‘semi-safe’ in 2019, it is only
a matter of time until more powerful GPUs, will see password cracking
accelerate!
E n t r o p y G u i d e
The entropy growth linearity…
Length: 15, 16, 17, 18, 19
Strength: Strong (>16) - Safeguards sensitive information like
financial records
Entropy: 92.6 bits, 100 bits, 106.7 bits, 113.9 bits, 121.9
Empirical Security Threshold ~ 100 bits
T H I N K F U T U R E
The ‘clicks/nulls’ are easy to find
Beware of the dummy
clicks on some of the
later models - they can
throw you off the track
to eventual success !
It is easy to teach a
child to crack locks
of this kind!
No Feel or sound
Owners have the upper hand at this point
But the enemy only needs a
weak or silly password to
b r e a k i n a n d a s s u m e
full control…and
t h e n t h e f u n
really starts!
M o s t b r e a k - i n s a t t h i s l e ve l
a r e d o w n t o t h e o w n e r / u s e r
n a i v e t y, l a x i t y, a n d / o r i n f o r m a t i o n
g a i n e d f r o m s o m e e x t e r n a l s o u r c e …
cracking Challenge
Access limited to the keyboard and screen only
Human typing speed
What can be guessed
Try all common passwords
Brute Force Trial and Error
Phishing/Spear-Phishing
Social Engineering
Prior Observation
WiFi Break-in
BlueTooth Break-in
Identical browser data ?
Same password for all ?
Similar format for all ?
Common key storage ?
All BlueTooth Linked ?
Public Data ?
Social Nets ?
Family Data?
Publications?
Hobbies?
Likes ? Finger
Face
Print
Spoof
One device hit/
stolen: then all
c a n b e l o c k e d
d o w n w h e n o n
line + location
& pics of thief
can be tracked
/recorded
Additions include
3 s t r i ke f re e ze -
outs for 5, 15, 60
min, followed by
p ro v i d e r g e n e ra l
security alert
I n v i s i b l e t o u s !
Network, site, service and app attacks
Wa y b e y o n d h u m a n
s c a l e a n d m e n t a l
a b i l i t i e s , b u t w e
m u s t s t a r t w i t h a
level of fundamental
security based on a
s t r o n g p a s s w o r d
p ro t e c t e d c o re a n d
connected devices
Concatenated complexity can
be employed to confound the
e n e m y…ve r y h a rd f o r t h e m
a n d ve r y e a s y f o r u s !
cracking TASK
A prime driver of Password design
Secure Comms
Encrypted Vault
Encrypted File
Private Key
Public Key
E-Commerce
Bank Account
Financial Apps
Network Apps
Websites
Documents
E-Mail
Personal Computer
Work Station
Mobile Device
Bicycle Lock
STRENGTH
Password
Name/ID
Factors
Very-Low
Medium-High
Optional
Low-Medium
Optional
Extreme
No Exceptions
Very-Strong
No Exceptions
Extremely
Dynamic
Static
Mechanically
Set
Dynamic
Choice
Discipline
Changed
Occasionally
Regularly
Randomly
NEED
Risk
Exposure
Driven
Centuries
Millenia
Decades
Years
Minutes
Time to
Crack
Making it Safer
C o n c a t e n a t i o n o f t h e s i m p l e
C u s t o m e r N u m b e r, P a s s w o rd +
invisible biome tri cs and ID/app
checks+++
T h r e e f a i l e d t r i e s w i t h a n y
i n c o r re c t o r s u s p i c i o u s e n t r i e s /
information and the u s er is th e
frozen out for a period. The
‘ f r e e z e o u t ’ p e r i o d i s t h e n
progressively extended on every
repeated log-in attempt: security
d e p a r t m e n t i s a l e r t e d a n d
c u s t o m e r s a r e a s k e d t o s t a r t
from a new log on process
Password Libraries!
Extensive collections built from successful hacks
There are organisations collecting & marketing
Passwords, PINs, ID and Card info on a business
basis across the internet…and ‘The Dark Side’ is
a prime mover and key player…
Libraries are now a
key component of the
leading edge password
attack engines/machines
The Dark Side are not
the only ones using
such libraries !
Criminal Hackers
Rogue States
State Security Services
Always use A Checker
T h e y g i ve ‘ B r u t e F o rc e’ c ra c k i n g t i m e e s t i m a t e s
B e w a r e t h a t t h e y a r e
based on computing power
t o d a y, a n d n o t t h e f u t u re !
NOTE : ‘Brut e F orce’ im pli es
e x h a u s t i v e s e a r c h i n g w i t h
no a priori sophistication….
ie, t he use of lib rari es i s
not the norm here!
Dozens available: and it is
worth testing a range…
For M o dest Security
C h o o s e s o m e t h i n g e a s y t o re m e m b e r & m o d i f y
VerseProseDatesPlacesNames
++++++
I wandered lonely as a cloud
That floats o’er vales and hills,
When all at once I saw a crowd
I w l a a c Wa a o I s a c
I w 1 a A c Wa 1 2 D a y s
I w 1 a A c Wa A o 4 Ye a r s
I w 1 a A c Wa A o I 5 4 C
I w 1 a A c Wa A o I 5 a C 3 2 7 C
I w 1 a A c Wa A o I 5 a C £ $ 1 0 K C +
Wordsworth
F a v o u r i t e P r o s e / P o e m s
T h e t r i c k i s t o d e s t r o y /
d i s g u i s e / o b s c u r e l e t t e r
p a t t e r n s t h a t m i g h t
h j e l p m a c h i n e s i d e n t i f y
s e n t e n c e s a n d v e r s e s
U s i n g o n l y t h e f i r s t o r
l a s t l e t t e r i s a s t a r t ,
b u t u s i n g e v e r y o t h e r
l e t t e r p l u s s y m b o l
o b s c u r a t i o n i s b e t t e r !
Do not go qentle into that good night
o t o e o t d t
o t o e o t d t 1 2 D a y s
O To e 0 t d 7 4 M o n t h
O To e 0 7 d t ! 4 Ye a r s
O To e 0 7 d t ! 6 9 3 3 Ye a r s
£ O To e 0 7 d t ! 6 9 4 C
P a s s w o r d g e n e r a t i o n b y a n
a l g o r i t h m o f y o u r f a v o u r i t e
v e r s e a n d o n e m e m o r a b l e y e a r s
DYLAN THOMAS
M o s t s m a r t a t t a c k e n g i n e s w i l l
e v e n t u a l l y d e c o d e p a s s w o r d s
b a s e d o n p ro s e a n d v e r s e f o r a l l
c o m m o n l y re a d t e x t … b e s t c h o o s e
s o m e t h i n g r a r e / o b s c u r e … s p e c i a l t o
y o u a n d y o u r l i f e r e m e m b r a n c e s …
S m a r t m a c h i n e s
Awa re o f Wo rd s wo r t h & T h o m a s e t a l
E n h a n c i n g S e c u r i t y
S t a r t f ro m a c a t a l o g u e o f t h i n g s o n l y y o u k n o w
Layering
algorithmic
complexity
to
increase
the
Entropy
All about you
Known by you and you alone
WHO WE: Are; Know; Met; Loved; Married; +++
H O W W E : L e a r n e d t o D r i v e ; We re E d u c a t e d ; + + +
W H Y W E : D e c i d e d ( Y ) ; P u r c h a s e d ( Z ) ; + + +
WHAT WE: D o ; D i d ; L i k e ; B e l i e v e ; Re a d ; + + +
WHERE WE: L i v e d ; V i s i t ; P ro p o s e d ; M a r r i e d ; + + +
algorithmic vectors
Carpenter
Space Shuttle
Constructing; not remembering passwords
Something you:
- Do
- Did
- Saw
- Are
- Said
- Were
- Know
- Admire
- Possess
- Possessed
- Remember
- Understand
Hillman Imp
Drill
C r S e D l H n I p
C r 5 3 D 4 H n 1 p ! !
4C to
Crack
login vectors
Constructing - not remembering
Carpenter
Space Shuttle
Algorithmic construction by
the concatenation of elements
only known by you…
Enhancing login vectors
Perhaps a line from a song:
“Its a kind of magic”
15akd0fmc!
<4 Years to Crack
Plenty strong enough for a laptop log-in
or document password
Perhaps a line from a book:
“It was the best of times”
1tw573bt0fts
<4 C to Crack
Something you like to sing and/or listen to…
Algorithmic construction by
the concatenation of elements
only known by you…
Enhancing login vectors
Something between lovers or parent
and child:
I will always be here for you no
matter
How I love thee more than life
itself
H w 1 4 3 7 e m 3 t n 4 e i f ! !
1 w 1 a s b 3 h e f r y u n 0 m r !
>10kC to Crack
>10kC to Crack
Something unique you said or promised within your family
Algorithmic construction by
the concatenation of elements
only known by you…
Concatenating numerous
very low cost biometrics
is extremely powerful…
- Eye 10
-3
@ < $5
- Face 10
-2
@ < $2
- Hand 10
-3
@ < $2
- Voice 10
-3
@ < $2
- Typing 10
-3
@ < $2
- Habits 10
-2
@ < $1
- Devices 10
-1
@ < $1
- Locations 10
-2
@ < $1
- ++++
Password ++
The typing rhythm at an
ATM is unique and very
cheap to recognise…
Morse Code experience
was the pre-cursor to
this solution…
Error Probability
<10
-8
@ < $6
Obscuration by ’n' layers
Automate the process
Choose a (or >1) reputable password generator
Ensure that it is fit for purpose
and that you choose sensible
settings by application and by
need
Overview
A proportional view
Device > 6…defeats humans
Web Site >10…concatenate
Document >12 - 16
Encryption >14 - 32
Membership >14…concatenate
Social Networks >14…concatenate
Financial Services >16 - 32…concatenate
Concatenate = May Include: ID/PIN,Password/Questions/3 Try Limit/
BioMetrics/Random CheckBack/
2/3 Factor Authentication/++
l a y e r e d S e c u r i t y
Ex p onent ially increasing the entropy challenge
6 Digit PIN > 8 Character
Password Name/ID
> 10 Character
Password
Name/ID
> 14 Character
Password
Name/ID + PIN
>16 Character
Password
BackEnd
BIOMetrics
Up Front
BIOMetrics
T h e r e i s a l w a y s a t h r e a t
R E M E M B E R
I t i s s m a r t :
S h a r i n g
R u t h l e s s
D y n a m i c
L e a r n i n g
A d a p t i n g
C o n s t a n t
M o t i v a t e d
N e t w o r ke d
+ + +
B e yo n d T h e L a w
F o r M o r e G OTO :
https://bit.ly/2F0y6in
https://bit.ly/2SuwVzL
https://bit.ly/2FcCtqR
https://bit.ly/2SxHsKv
https://bit.ly/2QsmBWb
https://bit.ly/2MBED7v
https://bit.ly/39mJNxB
Thank You
57Ay5af3K33p53CuR3
Make it very hard for the enemy
- everything is at stake!
petercochrane.com

Weitere ähnliche Inhalte

Was ist angesagt?

Working With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In GhanaWorking With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In GhanaIDS
 
Managing a Crisis in the New World of Social Media
Managing a Crisis in the New World of Social MediaManaging a Crisis in the New World of Social Media
Managing a Crisis in the New World of Social Mediaali Bullock
 
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...Andres Agostini, Future Knowledgist
 
In pursuit of messaging broker(s)
In pursuit of messaging broker(s)In pursuit of messaging broker(s)
In pursuit of messaging broker(s)David Gevorkyan
 
Will 3D printing change everything?
Will 3D printing change everything?Will 3D printing change everything?
Will 3D printing change everything?Martina F. Ferracane
 
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...Andres Agostini, Polymath Futurist
 
Pintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @PinterestPintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @PinterestSuman Karumuri
 
Pintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@PinterestPintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@PinterestSuman Karumuri
 
Ninja Correlation of APT Binaries
Ninja Correlation of APT BinariesNinja Correlation of APT Binaries
Ninja Correlation of APT BinariesCODE BLUE
 
Consequences of an Insightful Algorithm
Consequences of an Insightful AlgorithmConsequences of an Insightful Algorithm
Consequences of an Insightful AlgorithmCarina C. Zona
 

Was ist angesagt? (19)

Surveillance society
Surveillance societySurveillance society
Surveillance society
 
Cyber Security - Becoming Evil
Cyber Security - Becoming EvilCyber Security - Becoming Evil
Cyber Security - Becoming Evil
 
Demystifying Information Theory
Demystifying Information TheoryDemystifying Information Theory
Demystifying Information Theory
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
The Scientific Method
The Scientific MethodThe Scientific Method
The Scientific Method
 
Its My Data Not Yours!
Its My Data Not Yours!Its My Data Not Yours!
Its My Data Not Yours!
 
Working With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In GhanaWorking With Parliamentarians On Srh In Ghana
Working With Parliamentarians On Srh In Ghana
 
Managing a Crisis in the New World of Social Media
Managing a Crisis in the New World of Social MediaManaging a Crisis in the New World of Social Media
Managing a Crisis in the New World of Social Media
 
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
 
AUA Data Science Meetup
AUA Data Science MeetupAUA Data Science Meetup
AUA Data Science Meetup
 
In pursuit of messaging broker(s)
In pursuit of messaging broker(s)In pursuit of messaging broker(s)
In pursuit of messaging broker(s)
 
DATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITYDATA FLOWS & NATIONAL SECURITY
DATA FLOWS & NATIONAL SECURITY
 
Will 3D printing change everything?
Will 3D printing change everything?Will 3D printing change everything?
Will 3D printing change everything?
 
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
Futuretronium Book 100.0 (The Revolution II)! By Andres Agostini at http://li...
 
Pintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @PinterestPintrace: Distributed tracing @Pinterest
Pintrace: Distributed tracing @Pinterest
 
Pintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@PinterestPintrace: Distributed tracing@Pinterest
Pintrace: Distributed tracing@Pinterest
 
Ninja Correlation of APT Binaries
Ninja Correlation of APT BinariesNinja Correlation of APT Binaries
Ninja Correlation of APT Binaries
 
Consequences of an Insightful Algorithm
Consequences of an Insightful AlgorithmConsequences of an Insightful Algorithm
Consequences of an Insightful Algorithm
 

Ähnlich wie How to Design Passwords

Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Vlad Styran
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thsamirapdcosden
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
Developing Software with Security in Mind
Developing Software with Security in MindDeveloping Software with Security in Mind
Developing Software with Security in Mindsblom
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationMike Saunders
 
2012 03 The Death of Passwords
2012 03 The Death of Passwords2012 03 The Death of Passwords
2012 03 The Death of PasswordsRaleigh ISSA
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 

Ähnlich wie How to Design Passwords (20)

Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Securing password
Securing passwordSecuring password
Securing password
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Password management
Password managementPassword management
Password management
 
Developing Software with Security in Mind
Developing Software with Security in MindDeveloping Software with Security in Mind
Developing Software with Security in Mind
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Is your password_safe_ss
Is your password_safe_ssIs your password_safe_ss
Is your password_safe_ss
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
2012 03 The Death of Passwords
2012 03 The Death of Passwords2012 03 The Death of Passwords
2012 03 The Death of Passwords
 
Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 

Mehr von University of Hertfordshire

ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & ResilienceUniversity of Hertfordshire
 

Mehr von University of Hertfordshire (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
MSP Automation - Application and Execution
MSP Automation - Application and ExecutionMSP Automation - Application and Execution
MSP Automation - Application and Execution
 
ICTON 2020 KeyNote: Evolving Network Security & Resilience
ICTON 2020 KeyNote:  Evolving Network Security & ResilienceICTON 2020 KeyNote:  Evolving Network Security & Resilience
ICTON 2020 KeyNote: Evolving Network Security & Resilience
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

How to Design Passwords

  • 1. H o w To D e s i g n pA55w0rDs:-)petercochrane.com ABC12345def Prof Peter Cochrane OBE Sentient Systems
  • 2. THE nIGHTMARE! *A different password for each account *Change your passwords regularly *Don’t keep a documented record *Don’t embed them in a browser *Don’t write them down *Don’t tell anyone *Don’t share Guidelines and lots of useful advice that is often impractical and/or impossible:- Make them > 11 characters that include a mix of alpha numerics - upper & lower case plus punctuation marks and special characters…
  • 3. Public Reality! A fundamental incapability to deal & cope with the complexities and many challenges of IT… Industry needs to produce, deliver and maintain inherently secure products - to get the users out of the Realm of Risk management, including password hell!
  • 4. OMG - Really ! YES, people are indeed silly We need to do much better than this!
  • 5. THE Threat Omnipresent Highly motivated Growing by the day Smart Adaptive Resourceful Well organised Global 24 x 7 People Machines Networks AI, Apps, Clouds +++ “Never underestimate the enemy - and never . assume you are smarter than they are”
  • 6. Passwords in ‘diaries’ Passwords in ‘eMails’ Passwords on ‘post its’ Passwords in ‘open docs’ Passwords on ‘white boards’ Passwords shared ‘between apps’ Passwords shared ‘between peoples’ Passwords shared ‘between web sites’ Passwords used on spoof web sites/services +++++ The Gullibility Threat Social engineering - persuasion - observation - bribes ++ Passwords extracted by ‘smart’ conversationalists, friends, family, associates, colleagues, co-workers ++++
  • 7. Welcome to password & two factor hell! We need to do much better than this! What do you do when there is no mobile signal or there’s a loooong delay or network fault? You need at least: a net sync’d app embedded on your machine, but ensure it does it imply more risk?
  • 8. 12 Characters, Minimum: There’s no minimum or standardised password length; but in general go for >12 to 14 characters Mix Numbers: Letters, Symbols, Upper & Lower-Case: Many different types makes passwords harder to crack Dictionary Words/Combination: To be avoided as much as possible - any isolated word is bad, and word combinations are also high risk Avoid Obvious Substitutions: Eg, replacing an ‘o’ with ‘0’ is obvious - a 3 for e or E, 2 for z or Z only slightly better - and DO use “, ; -} ] ) et al Number Strings: at the end, beginning or in the middle are also ‘obvious’ Industry Advice For a strong password you ‘at least’ need..
  • 9. 12 Characters, Minimum: There’s no minimum or standardised password length; but in general go for >12 to 14 characters Mix Numbers: Letters, Symbols, Upper & Lower-Case: Many different types makes passwords harder to crack Dictionary Words/Combination: To be avoided as much as possible - any isolated word is bad, and word combinations are also high risk Avoid Obvious Substitutions: Eg, replacing an ‘o’ with ‘0’ is obvious - a 3 for e or E, 2 for z or Z only slightly better - and DO use “, ; -} ] ) et al Number Strings: at the end, beginning or in the middle are also ‘obvious’ Industry Advice For a strong password you ‘at least’ need.. Machines are fast intelligent exhaustive with extensive libraries One size does not fit all people and machines present different risks people are slow and get exhausted and use different methods
  • 10. For a strong password you ‘at least’ need.. The snag is you are one click away from losing everything! And so another much bigger security fail/fail pops up and kills you stone dead! “The secret to good security is to design (in) ‘fail-safe’ and ‘fail-gracefully’ with ‘layered’ protection and multiple routes to recovery “All your ‘eggs’ in one basket is the dumbest and riskiest solution of all “ Strong Advice A password generator and management system
  • 11. Password Managers D e l e g a t i n g t h e n i g h t m a r e t o m a c h i n e s Mostly Software embedded in browser plugins/web services to automatically manage user credentials They auto-paste (names/ID/email addresses) passwords into login forms, or simulate typing them, and generally support: •Printable characters •Passwords >64 characters •Pasting username and password
  • 12. Password Managers D e l e g a t i n g t h e n i g h t m a r e t o m a c h i n e s Mostly Software embedded in browser plugins/web services to automatically manage user credentials They auto-paste (names/ID/email addresses) passwords into login forms, or simulate typing them, and generally support: •Printable characters •Passwords >64 characters •Pasting username and password don’t rely on one app alone m ake sure you engage a degree of diversity
  • 13. Password Managers D e l e g a t i n g t h e c o m p l e x i t y t o m a c h i n e s Also, choose embedded password generators with many user choices:- Length Upper Case Lower Case Numbers Symbols Special Characters Similar Characters Generate on Device Generate on Server Auto-Select New Password https://digital.com/blog/best-strong-password-generators/
  • 14. Password Managers W h y y o u n e e d / s h o u l d a l w a y s u s e o n e ! W h a t c o u l d p o s s i b l y g o w r o n g ? •Yo u r d e v i c e / m a c h i n e i s s t o l e n / b r o k e n / f a i l s / d i e s •A s o f t w a r e u p g r a d e s c r a m b l e s e v e r y t h i n g •Yo u r b a c k u p / r e c o v e r y p r o c e s s f a i l s •M a l w a r e f r e e z e s e v e r y t h i n g •T h e A p p / B r o w s e r f a i l s ………………..
  • 15. REALITY CHECK Diversity-essential to survival Confounding the enemy by the reduction of habituality - and the introduction of the new, unexpected, surprises, and a reduction of discernible patterns… At best you will prevent a break in, and at worst you should slow and impede the Dark Side to cost them time and $$$$ Vary your methods and measures as much/frequently as is reasonably possible. Maximise the total Entropy of your defences
  • 16. REALITY CHECK Diversity-essential to survival Beware of ‘Common Mode Failures’ due to an over reliance on one technology choice/route, or by being blind sided and/or overconfident in you choices, products, and engineering solutions. “Fortresses tend to remain relatively static whilst methods of attack always evolve” Get someone to attack and test your defences and solution(s)…never be so sure that you got it all right first time around…or indeed that it all exhibits longevity!
  • 17. Use a password and/or document/ file/folder encryption… Strongest Advice For protected documents that may be accessed The concatenation by layers can add exponential difficulty for any attacker Obscuration by volume and location is also an effective mode of protection Password protect at every layer
  • 18. Strongest Advice Use every weapon of defence you have available Do not rely on any one technique Respond rapidly to surprises Be prepared to be adaptive Use all available options Keep on top of new attack technologies - adapt and evolve on the fly…
  • 19. CrEating your own Making life very difficult for The Dark Side IcannaTellythee Thi5i5th3b35tIcand0 Non-standard/Novel solutions can be hard/expensive to defeat
  • 20. Degrees of Freedom Exploiting as many as possible @ the same time 26 Letters - Lower Case 26 Letters - Upper Case 10 Digits 36 Other } 96 Options per password character
  • 21. Password Entropy The more disorder the harder it is to crack Password Entropy = log2(Nn ) = n log2(N) Where N = Number of character options (ie ~96 for standard QWERTY keyboard) And n = Number of characters in the password Recognisable words and phrases + repeated characters + similar characters represent degrees of order that increase the likelihood that a password will be cracked. The bigger the Entropy/Disorder the stronger the password!
  • 22. Dominant Component T h e e n t r o p y o r d e r / d i s o r d e r b r e a k p o i n t Password Entropy = n log2(N) The ‘breakpoint’ is at n = log2(N) ie the password length ’n’ overtakes the number of possible character states ’N’ as the dominant factor All ‘viable’ passwords lie in the range n >> log2(N)
  • 23. viable length F o r a g i v e n a p p / p r o t e c t i o n In the proximity of the break point: N = 10 then   n > 3 = 104 symbol states <<< 1s (n = 4) N = 26 n > 4 = 1.2 x 107 << 1s (n = 5) N = 52 n > 5 = 1.2 x 1010 < 1s (n = 6) N = 62 n > 5 = 5.7 x1010 < 1m (n = 6) N = 98 n > 6 = 8.7 x1013 < 10m (n = 7) Relative Computing Time to Crack
  • 24. Ball Park Guide The entropy order/disorder breakpoint Password Length/Strength experience to 2019: 4 = Very Weak - puts you at risk 5 = Weak - just about OK for device password 8 = Fairly Strong for secure network access passwords 10 = Strong for secure access to company websites and data 16 = Very Strong for securing commercial and financial data access 22+ = Hyper Secure for encryption While a password with ~50 bits may be deemed ‘semi-safe’ in 2019, it is only a matter of time until more powerful GPUs, will see password cracking accelerate!
  • 25. E n t r o p y G u i d e The entropy growth linearity… Length: 15, 16, 17, 18, 19 Strength: Strong (>16) - Safeguards sensitive information like financial records Entropy: 92.6 bits, 100 bits, 106.7 bits, 113.9 bits, 121.9 Empirical Security Threshold ~ 100 bits
  • 26. T H I N K F U T U R E The ‘clicks/nulls’ are easy to find Beware of the dummy clicks on some of the later models - they can throw you off the track to eventual success ! It is easy to teach a child to crack locks of this kind!
  • 27. No Feel or sound Owners have the upper hand at this point But the enemy only needs a weak or silly password to b r e a k i n a n d a s s u m e full control…and t h e n t h e f u n really starts! M o s t b r e a k - i n s a t t h i s l e ve l a r e d o w n t o t h e o w n e r / u s e r n a i v e t y, l a x i t y, a n d / o r i n f o r m a t i o n g a i n e d f r o m s o m e e x t e r n a l s o u r c e …
  • 28. cracking Challenge Access limited to the keyboard and screen only Human typing speed What can be guessed Try all common passwords Brute Force Trial and Error Phishing/Spear-Phishing Social Engineering Prior Observation WiFi Break-in BlueTooth Break-in Identical browser data ? Same password for all ? Similar format for all ? Common key storage ? All BlueTooth Linked ? Public Data ? Social Nets ? Family Data? Publications? Hobbies? Likes ? Finger Face Print Spoof One device hit/ stolen: then all c a n b e l o c k e d d o w n w h e n o n line + location & pics of thief can be tracked /recorded Additions include 3 s t r i ke f re e ze - outs for 5, 15, 60 min, followed by p ro v i d e r g e n e ra l security alert
  • 29. I n v i s i b l e t o u s ! Network, site, service and app attacks Wa y b e y o n d h u m a n s c a l e a n d m e n t a l a b i l i t i e s , b u t w e m u s t s t a r t w i t h a level of fundamental security based on a s t r o n g p a s s w o r d p ro t e c t e d c o re a n d connected devices Concatenated complexity can be employed to confound the e n e m y…ve r y h a rd f o r t h e m a n d ve r y e a s y f o r u s !
  • 30. cracking TASK A prime driver of Password design Secure Comms Encrypted Vault Encrypted File Private Key Public Key E-Commerce Bank Account Financial Apps Network Apps Websites Documents E-Mail Personal Computer Work Station Mobile Device Bicycle Lock STRENGTH Password Name/ID Factors Very-Low Medium-High Optional Low-Medium Optional Extreme No Exceptions Very-Strong No Exceptions Extremely Dynamic Static Mechanically Set Dynamic Choice Discipline Changed Occasionally Regularly Randomly NEED Risk Exposure Driven Centuries Millenia Decades Years Minutes Time to Crack
  • 31. Making it Safer C o n c a t e n a t i o n o f t h e s i m p l e C u s t o m e r N u m b e r, P a s s w o rd + invisible biome tri cs and ID/app checks+++ T h r e e f a i l e d t r i e s w i t h a n y i n c o r re c t o r s u s p i c i o u s e n t r i e s / information and the u s er is th e frozen out for a period. The ‘ f r e e z e o u t ’ p e r i o d i s t h e n progressively extended on every repeated log-in attempt: security d e p a r t m e n t i s a l e r t e d a n d c u s t o m e r s a r e a s k e d t o s t a r t from a new log on process
  • 32. Password Libraries! Extensive collections built from successful hacks There are organisations collecting & marketing Passwords, PINs, ID and Card info on a business basis across the internet…and ‘The Dark Side’ is a prime mover and key player… Libraries are now a key component of the leading edge password attack engines/machines The Dark Side are not the only ones using such libraries ! Criminal Hackers Rogue States State Security Services
  • 33. Always use A Checker T h e y g i ve ‘ B r u t e F o rc e’ c ra c k i n g t i m e e s t i m a t e s B e w a r e t h a t t h e y a r e based on computing power t o d a y, a n d n o t t h e f u t u re ! NOTE : ‘Brut e F orce’ im pli es e x h a u s t i v e s e a r c h i n g w i t h no a priori sophistication…. ie, t he use of lib rari es i s not the norm here! Dozens available: and it is worth testing a range…
  • 34. For M o dest Security C h o o s e s o m e t h i n g e a s y t o re m e m b e r & m o d i f y VerseProseDatesPlacesNames ++++++
  • 35. I wandered lonely as a cloud That floats o’er vales and hills, When all at once I saw a crowd I w l a a c Wa a o I s a c I w 1 a A c Wa 1 2 D a y s I w 1 a A c Wa A o 4 Ye a r s I w 1 a A c Wa A o I 5 4 C I w 1 a A c Wa A o I 5 a C 3 2 7 C I w 1 a A c Wa A o I 5 a C £ $ 1 0 K C + Wordsworth F a v o u r i t e P r o s e / P o e m s T h e t r i c k i s t o d e s t r o y / d i s g u i s e / o b s c u r e l e t t e r p a t t e r n s t h a t m i g h t h j e l p m a c h i n e s i d e n t i f y s e n t e n c e s a n d v e r s e s U s i n g o n l y t h e f i r s t o r l a s t l e t t e r i s a s t a r t , b u t u s i n g e v e r y o t h e r l e t t e r p l u s s y m b o l o b s c u r a t i o n i s b e t t e r !
  • 36. Do not go qentle into that good night o t o e o t d t o t o e o t d t 1 2 D a y s O To e 0 t d 7 4 M o n t h O To e 0 7 d t ! 4 Ye a r s O To e 0 7 d t ! 6 9 3 3 Ye a r s £ O To e 0 7 d t ! 6 9 4 C P a s s w o r d g e n e r a t i o n b y a n a l g o r i t h m o f y o u r f a v o u r i t e v e r s e a n d o n e m e m o r a b l e y e a r s DYLAN THOMAS
  • 37. M o s t s m a r t a t t a c k e n g i n e s w i l l e v e n t u a l l y d e c o d e p a s s w o r d s b a s e d o n p ro s e a n d v e r s e f o r a l l c o m m o n l y re a d t e x t … b e s t c h o o s e s o m e t h i n g r a r e / o b s c u r e … s p e c i a l t o y o u a n d y o u r l i f e r e m e m b r a n c e s … S m a r t m a c h i n e s Awa re o f Wo rd s wo r t h & T h o m a s e t a l
  • 38. E n h a n c i n g S e c u r i t y S t a r t f ro m a c a t a l o g u e o f t h i n g s o n l y y o u k n o w Layering algorithmic complexity to increase the Entropy
  • 39. All about you Known by you and you alone WHO WE: Are; Know; Met; Loved; Married; +++ H O W W E : L e a r n e d t o D r i v e ; We re E d u c a t e d ; + + + W H Y W E : D e c i d e d ( Y ) ; P u r c h a s e d ( Z ) ; + + + WHAT WE: D o ; D i d ; L i k e ; B e l i e v e ; Re a d ; + + + WHERE WE: L i v e d ; V i s i t ; P ro p o s e d ; M a r r i e d ; + + +
  • 40. algorithmic vectors Carpenter Space Shuttle Constructing; not remembering passwords Something you: - Do - Did - Saw - Are - Said - Were - Know - Admire - Possess - Possessed - Remember - Understand Hillman Imp Drill C r S e D l H n I p C r 5 3 D 4 H n 1 p ! ! 4C to Crack login vectors Constructing - not remembering Carpenter Space Shuttle Algorithmic construction by the concatenation of elements only known by you…
  • 41. Enhancing login vectors Perhaps a line from a song: “Its a kind of magic” 15akd0fmc! <4 Years to Crack Plenty strong enough for a laptop log-in or document password Perhaps a line from a book: “It was the best of times” 1tw573bt0fts <4 C to Crack Something you like to sing and/or listen to… Algorithmic construction by the concatenation of elements only known by you…
  • 42. Enhancing login vectors Something between lovers or parent and child: I will always be here for you no matter How I love thee more than life itself H w 1 4 3 7 e m 3 t n 4 e i f ! ! 1 w 1 a s b 3 h e f r y u n 0 m r ! >10kC to Crack >10kC to Crack Something unique you said or promised within your family Algorithmic construction by the concatenation of elements only known by you…
  • 43. Concatenating numerous very low cost biometrics is extremely powerful… - Eye 10 -3 @ < $5 - Face 10 -2 @ < $2 - Hand 10 -3 @ < $2 - Voice 10 -3 @ < $2 - Typing 10 -3 @ < $2 - Habits 10 -2 @ < $1 - Devices 10 -1 @ < $1 - Locations 10 -2 @ < $1 - ++++ Password ++ The typing rhythm at an ATM is unique and very cheap to recognise… Morse Code experience was the pre-cursor to this solution… Error Probability <10 -8 @ < $6 Obscuration by ’n' layers
  • 44. Automate the process Choose a (or >1) reputable password generator Ensure that it is fit for purpose and that you choose sensible settings by application and by need
  • 45. Overview A proportional view Device > 6…defeats humans Web Site >10…concatenate Document >12 - 16 Encryption >14 - 32 Membership >14…concatenate Social Networks >14…concatenate Financial Services >16 - 32…concatenate Concatenate = May Include: ID/PIN,Password/Questions/3 Try Limit/ BioMetrics/Random CheckBack/ 2/3 Factor Authentication/++
  • 46. l a y e r e d S e c u r i t y Ex p onent ially increasing the entropy challenge 6 Digit PIN > 8 Character Password Name/ID > 10 Character Password Name/ID > 14 Character Password Name/ID + PIN >16 Character Password BackEnd BIOMetrics Up Front BIOMetrics
  • 47. T h e r e i s a l w a y s a t h r e a t R E M E M B E R I t i s s m a r t : S h a r i n g R u t h l e s s D y n a m i c L e a r n i n g A d a p t i n g C o n s t a n t M o t i v a t e d N e t w o r ke d + + + B e yo n d T h e L a w F o r M o r e G OTO : https://bit.ly/2F0y6in https://bit.ly/2SuwVzL https://bit.ly/2FcCtqR https://bit.ly/2SxHsKv https://bit.ly/2QsmBWb https://bit.ly/2MBED7v https://bit.ly/39mJNxB
  • 48. Thank You 57Ay5af3K33p53CuR3 Make it very hard for the enemy - everything is at stake! petercochrane.com