SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Risks associated with Password based
      Whitepaper
                                 authentication

                                  Password-based authentication is one of the most popular approaches to
                                  authenticate a user in various enterprise applications. But there are many
                                  problems associated with the password based authentication systems and the
                                  risks associated with using passwords as an authentication mechanism for
                                  enterprise applications is not completely secure.

PASSWORD PROBLEM                  Considering all the risks associated with password based authentication
                                  systems, there is a strong need for enterprises to switch to a stronger
The problem that, secure          authentication system which provides security against the various hacking
passwords are difficult to        attacks and also which is more convenient and easier to the end user of the
remember and easy-to-             system
remember passwords are
easy to break in most cases,      Challenges with Password based Authentication:
is referred to as the
                                  1. Easy passwords can be cracked
Password Problem.
                                  The end user’s behaviour such as choosing passwords that are easy to
                                  remember introduces the majority of the password weaknesses. For a hacker,
IDEAL PASSWORD                    these passwords can easily be cracked or guessed. Surveys show that frequent
                                  passwords are the word ‘password’, personal names of family members,
Today from security               names of pets, and dictionary words.
standpoint, the ideal
password is a string of eight
or more random characters,        2. Random passwords can’t be remembered
which includes digits, letters
                                  A random password should not have a content, context, and should not be
with a mixture of upper and
                                  familiar. It can only be learned by using it over and over again. However, since
lower case, and special           repetition is a weak way of remembering, users often completely ignore the
characters, is not a              recommendations for pseudo-random passwords.
dictionary word and is not
related to personal
information, such as social       3. Remembering Multiple Passwords
security number, street
                                  Moreover, today’s users have to remember more than one password for
address, or birth date.
                                  computers, mail accounts, social media applications, online banking, and much
                                  more. A survey of IT professionals found out that the average IT professional
                                  has to remember approximately five to six passwords and almost 25% of the IT
                                  professional has to manage eight or more passwords. The more passwords a
                                  person has to remember, the chances for remembering any specific password
                                  decreases. Having multiple passwords also increases the chance of
                                  interference among similar passwords. This is especially true for systems that
                                  are not used frequently.
Risks associated with Password based authentication - Whitepaper




4. Problems with passwords that needs to be continuously
   changed

Computer systems require frequent password changes, to make the system
robust from various attacks. Common techniques require that passwords are
changed every 30 or 90 days. However, the more frequently a password has to
be changed, the harder it will be to remember. Users must think of new
passwords that conform to all of the organization’s requirements but that are
also easy to remember. System-enforced password policies, however, cannot
guarantee password secrecy.



5. Security vs. Ease-of-Use for Passwords

To “solve” the Password Problem, users will try to decrease the memory
burden at the expense of security. Most commonly, the user will write down
passwords, raising the potential of compromise of the passwords. In the case
of multiple systems, users may choose only one password for all systems. This
reduces security and if the password is broken for one computer system, every
single computer system is compromised. Alternatively, users create their own
rules to generate multiple passwords that have something in common, for
example adding a digit to a base word for each new password, which is also an
unsafe method. Weak passwords can be broken by dictionary attacks or
attacks based on knowledge about the password owner. Because of password-
cracker programs, users need to create unpredictable passwords, which are
more difficult to memorize.



6. Shoulder Surfing Attack

Shoulder surfing is looking over someone’s shoulder when they enter a
password or a PIN code. It is an effective way to get information in crowded
places because it is relatively easy to stand next to someone and watch as they
fill out a form, enter a PIN number at an ATM machine, or use a calling card at
a public pay phone. Shoulder surfing can also be done at a distance with the
aid of binoculars or other vision-enhancing devices to know the password.
Shoulder surfing can be done easily on the password system, just by seeing the
keys that the user types.




                                                                          Page 2
Risks associated with Password based authentication - Whitepaper



7. Keyloggers

       Keyloggers are the best example of a spyware, which are installed on
        the victim machines without user’s knowledge and monitors all the
        keystrokes. Keyloggers can be in one of two different forms - Hardware
        device, Small program (spyware).
       As a hardware device, a Keylogger is a small battery-sized plug that
        serves as a connector between the user's computer and keyboard. As
        the device resembles an ordinary keyboard plug, it is relatively easy to
        physically hide such a device "in plain sight." As the user types, the
        device collects and saves the keystrokes as text in its own memory. At
        a later point of time, the person who installed the Keylogger must
        return and physically remove the device in order to access the
        information the device has gathered.
       On the other hand a Keylogger program does not require physical
        access to the user's computer. It can be downloaded deliberately by
        someone who wants to monitor activity on a particular computer or it
        can be downloaded accidentally as spyware and executed as part of a
        remote administration (RAT) Trojan horse.
       The Keylogger program records each keystroke the user types and
        uploads the information over the Internet periodically to the one
        installed the program. Once the hacker gets the information from
        Keylogger, the hacker can mimic the actual user and there is no way
        the authentication server can distinguish the real user and the hacker.



Conclusion:

Considering all the above factors, password based authentication is no longer
sufficient for the security needs of any enterprise. So there is a growing trend
among many enterprises globally to move to a stronger authentication solution
which provides high level of security with-out compromising the user’s
convenience.       ArrayShield IDAS Two Factor authentication protects
Organizations from Identity and data theft, hence provides peace of mind.




                                                                          Page 3
Risks associated with Password based authentication - Whitepaper




                                            ABOUT ARRAYSHIELD
Array Shield Technologies is the maker of software security products in the
area of Multi-Factor Authentication. The company’s mission is to provide highly
secure, cost effective and easy to use software security solutions globally.

For more information, visit us at www.arrayshield.com




                                                                          Page 4

Weitere ähnliche Inhalte

Mehr von ArrayShield Technologies Private Limited

Mehr von ArrayShield Technologies Private Limited (7)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Risks with passwords

  • 1. Risks associated with Password based Whitepaper authentication Password-based authentication is one of the most popular approaches to authenticate a user in various enterprise applications. But there are many problems associated with the password based authentication systems and the risks associated with using passwords as an authentication mechanism for enterprise applications is not completely secure. PASSWORD PROBLEM Considering all the risks associated with password based authentication systems, there is a strong need for enterprises to switch to a stronger The problem that, secure authentication system which provides security against the various hacking passwords are difficult to attacks and also which is more convenient and easier to the end user of the remember and easy-to- system remember passwords are easy to break in most cases, Challenges with Password based Authentication: is referred to as the 1. Easy passwords can be cracked Password Problem. The end user’s behaviour such as choosing passwords that are easy to remember introduces the majority of the password weaknesses. For a hacker, IDEAL PASSWORD these passwords can easily be cracked or guessed. Surveys show that frequent passwords are the word ‘password’, personal names of family members, Today from security names of pets, and dictionary words. standpoint, the ideal password is a string of eight or more random characters, 2. Random passwords can’t be remembered which includes digits, letters A random password should not have a content, context, and should not be with a mixture of upper and familiar. It can only be learned by using it over and over again. However, since lower case, and special repetition is a weak way of remembering, users often completely ignore the characters, is not a recommendations for pseudo-random passwords. dictionary word and is not related to personal information, such as social 3. Remembering Multiple Passwords security number, street Moreover, today’s users have to remember more than one password for address, or birth date. computers, mail accounts, social media applications, online banking, and much more. A survey of IT professionals found out that the average IT professional has to remember approximately five to six passwords and almost 25% of the IT professional has to manage eight or more passwords. The more passwords a person has to remember, the chances for remembering any specific password decreases. Having multiple passwords also increases the chance of interference among similar passwords. This is especially true for systems that are not used frequently.
  • 2. Risks associated with Password based authentication - Whitepaper 4. Problems with passwords that needs to be continuously changed Computer systems require frequent password changes, to make the system robust from various attacks. Common techniques require that passwords are changed every 30 or 90 days. However, the more frequently a password has to be changed, the harder it will be to remember. Users must think of new passwords that conform to all of the organization’s requirements but that are also easy to remember. System-enforced password policies, however, cannot guarantee password secrecy. 5. Security vs. Ease-of-Use for Passwords To “solve” the Password Problem, users will try to decrease the memory burden at the expense of security. Most commonly, the user will write down passwords, raising the potential of compromise of the passwords. In the case of multiple systems, users may choose only one password for all systems. This reduces security and if the password is broken for one computer system, every single computer system is compromised. Alternatively, users create their own rules to generate multiple passwords that have something in common, for example adding a digit to a base word for each new password, which is also an unsafe method. Weak passwords can be broken by dictionary attacks or attacks based on knowledge about the password owner. Because of password- cracker programs, users need to create unpredictable passwords, which are more difficult to memorize. 6. Shoulder Surfing Attack Shoulder surfing is looking over someone’s shoulder when they enter a password or a PIN code. It is an effective way to get information in crowded places because it is relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done at a distance with the aid of binoculars or other vision-enhancing devices to know the password. Shoulder surfing can be done easily on the password system, just by seeing the keys that the user types. Page 2
  • 3. Risks associated with Password based authentication - Whitepaper 7. Keyloggers  Keyloggers are the best example of a spyware, which are installed on the victim machines without user’s knowledge and monitors all the keystrokes. Keyloggers can be in one of two different forms - Hardware device, Small program (spyware).  As a hardware device, a Keylogger is a small battery-sized plug that serves as a connector between the user's computer and keyboard. As the device resembles an ordinary keyboard plug, it is relatively easy to physically hide such a device "in plain sight." As the user types, the device collects and saves the keystrokes as text in its own memory. At a later point of time, the person who installed the Keylogger must return and physically remove the device in order to access the information the device has gathered.  On the other hand a Keylogger program does not require physical access to the user's computer. It can be downloaded deliberately by someone who wants to monitor activity on a particular computer or it can be downloaded accidentally as spyware and executed as part of a remote administration (RAT) Trojan horse.  The Keylogger program records each keystroke the user types and uploads the information over the Internet periodically to the one installed the program. Once the hacker gets the information from Keylogger, the hacker can mimic the actual user and there is no way the authentication server can distinguish the real user and the hacker. Conclusion: Considering all the above factors, password based authentication is no longer sufficient for the security needs of any enterprise. So there is a growing trend among many enterprises globally to move to a stronger authentication solution which provides high level of security with-out compromising the user’s convenience. ArrayShield IDAS Two Factor authentication protects Organizations from Identity and data theft, hence provides peace of mind. Page 3
  • 4. Risks associated with Password based authentication - Whitepaper ABOUT ARRAYSHIELD Array Shield Technologies is the maker of software security products in the area of Multi-Factor Authentication. The company’s mission is to provide highly secure, cost effective and easy to use software security solutions globally. For more information, visit us at www.arrayshield.com Page 4