P@s$w0rdz: Stronger Passwords

Quotes | Why? | How? | Hackers; Credential Stuffing |
Types: Memorable or Complex |
Remember? | Before Jumping In


Bubblegum
"Sticky passwords" by gorbould
is licensed under CC BY-NC-ND 2.0

Quotes

4 tips
"Daring_Comic_Super_Password" by The Daring Librarian
is licensed under CC BY-NC-SA 2.0

Why (Strong) Passwords?

  • "Passwords are one of the primary pain points
    in our modern digital existence."

    ~Why You Need a Password Manager
  • Until a more effective, secure and reliable
    form of authentication appears,
    passwords are a necessary evil -- for now.
  • Strong passwords can prevent access
    to our financial and personal information
    by criminals and unethical governments.
  • Even if you think a site is unimportant,
    it may store some personal info
    with more added in the future.
  • If you reuse the same password on other sites
    and one of them is hacked, the attacker could
    log in as you on all your 'throwaway' sites
    and piece together your data fragments
    for a more complete dossier about you.
  • device pw
    Authorization by XKCD is licensed under a
    Creative Commons Attribution-NonCommercial 2.5

    Passkeys (discussed earlier) might eventually replace the need for many passwords.
    However, they may work best currently for recent devices from one vendor
    -- perhaps only with the latest (upgraded) OS versions,
    and only for some browsers and accounts/sites.

  • You still need strong device passwords for computer, tablet and/or phone
    -- passkeys are only as secure as the weakest device PIN/password.
  • You need to lock/logout device when away,
    to avoid access to your account, already logged-in sites, password resets, etc.
    [on right: general problem for all OSes & devices]

What Makes a Password Stronger?

81% stolen or hacked
"Password Guidance" by VCU CNS
is licensed under CC BY-NC 2.0

How Hackers Find Passwords
-- or Credential Stuffing Explained

Companies

  • Some companies have sloppy server & IT practices:
    old insecure web/database software, poorly paid/trained staff,
    weak/no password protection for sensitive files, etc.
    -- attacks on their sites can lead to data breaches
    (see Hackers below)
  • Top 500
    "Top 500 Passwords" by mkandlez
    is licensed under CC BY-NC 2.0

    Most companies provide client (user) software
    with security bugs, or missing or misconfigured
    privacy or security features / settings
    -- when these problems are discovered,
    some companies may be slow to offer software fixes,
    or deny/ignore/downplay the problem.

  • Although many client issues emerged with early users,
    Zoom promptly and frequently issued software client updates;
    there have been no apparent server problems
    -- so, what's the cause of the credentials scare (above)?

Users

  • Many users create accounts with the same userid/username,
    either because it's simpler to remember,
    or sites require using an email address
    -- and many users may have only one email.
  • when someone guy
    "password problems" by Dianna Geers
    is licensed under CC0 1.0

    Some reuse the same password from an existing account
    when creating a new account.

  • Some users, upon receiving an authentic-looking,
    alarming (phishing) email about a problem with account access,
    click on a conveniently provided link,
    and submit their username and password
    on an authentic-looking site -- directly to a hacker.
  • Enlightened attendees of my P@s$w0rdz or
    Be Safer on the Internet courses hopefully use unique passwords,
    don't click on email links, avoid fake sites,
    monitor data breaches, and follow other privacy/security practices.
Tot guessing
"Humm..'password', nope, 'secret', nope ..."
by GrahamKing is licensed under CC BY-NC-SA 2.0

Hackers

  • Hackers don't usually try to log into accounts directly
    by guessing passwords -- aka 'brute force', since it's too much work,
    and most sites limit login attempts, though they might avoid such limits
    by using botnets to attack from different IP addresses.
  • Hackers use phishing emails/sites to trick
    careless users into providing credentials.
  • Hackers collect/share/sell lists of 'credentials'
    -- usernames, passwords, credit cards and/or other info
    -- from phishing attacks (careless users), and attacks/leaks/breaches
    on various web sites/databases (sloppy company server security)
  • plain text pw
    "Hashing Password Bad" by Pluke, CC0, via Wikimedia Commons

    Usernames typically appear in plain text;
    credential lists may or may not involve passwords:
    most sites encode passwords as "hashes" (numerical codes);
    amazingly, a few sites store passwords unencrypted as plain text!

  • Some of the known breaches in recent years:
    Adobe, Anthem, Ashley Madison, Capital One, Charter,
    Delta, Doordash, Elsevier, Equifax, Expedia/Orbitz,
    Facebook, Hyatt, Kickstarter, Macys, Marriott/Starwood,
    Panera, Sears, Slack, Sprint, T-Mobile, Under Armour,
    Verizon, Whirlpool, Whole Foods, Zynga, ...

    -- but notably not Zoom
  • hashed pw
    "Hashing Password Hashed" by Pluke, CC0, via Wikimedia Commons

    Credential stuffing: hackers run searches of known passwords (hashes) against the leaked credentials lists

  • If one matches, hacker 'stuffs' those credentials into a different site.
  • Hacker often succeeds in logging in
    -- unless user had changed password or enabled other measures

Summary

  • So, if a user had created a Zoom (or any new) account with a password phished from fake site
    or reused from a different breached site, a hacker can easily login into Zoom
    -- unless user had quickly changed password, or enabled MFA (paid account only?),
    e.g., Zoom > Admin > Advanced > Security > Sign in with Two-Factor Authentication
  • wrench
    Security by XKCD is licensed via
    Creative Commons Attribution-NonCommercial 2.5

    Unfortunately, password reuse and clicking on phishing links are common
    -- potential problems for any site, not just Zoom

  • So, who enabled the hackers?
    The cause in this case (perhaps too bluntly),
    PICNIC: "Problem In Chair, Not In Computer",
    or PEBKAC: "Problem Exists Between Keyboard And Chair"
  • Strong password recommendations and other privacy/security advice are summarized above.
tough to type
"248 Secure Passwords" by acl John
is licensed under CC BY-NC-SA 2.0

Two Types of Strong Passwords:
Memorable or Complex

  • Memorable: for Devices & Password Manager (PM)
    -- 2+ stored in your brain; entered manually (typable)
  • For phone, 8-10 digit passcode (default is often only 4-6 digits),
    or alphanumeric.
  • For other tablets, computers & password managers,
    memorable long (5+ word) phrase;
    optional: numbers, capitals, punctuation, misspellings, etc.
  • Complex: for most Online Accounts
    (and private key for FileVault or PM)
    -- randomly generated by, stored in, filled-in by PM
  • If you don't have to remember or type it, why not make it as long and complex as site allows
    (24-100 random characters) -- even for 'unimportant' sites? e.g.,
    5iFt*b>Qyk[xpjrz@QoC2exanclhLvQ10izlX8hwxK6i=vwix14dwWVznQkvHrWh.
  • Autofill vs. Manual Entry: a PM may not be able to autofill passwords for certain sites/apps/services
  • If you can manually copy/paste the password from PM
    or duplicate it so that OS can autofill, e.g., Apple's Keychain,
    a Complex password is great.
  • However, if a site disables paste, or a device has a primitive keyboard interface,
    it's easier to enter a Memorable passphrase (minor punctuation, Shifting), e.g., Netflix login on a smart TV.
    It may be possible to use another keyboard with the device, e.g., iOS Apple TV Remote app.
  • So, generally you'll need to remember just 2+ strong passwords,
    and the password manager will store all others, which later it'll autofill or you'll paste or type.
  • wow change dialogIn the next section, we'll look at how
    to generate different kinds of passwords -- all unique, long and random:
  • Memorable and/or Typable by you: passcodes (PINs) and passphrases
    -- for devices, password manager, sites
  • Complex [Pastable by PM] character sequences -- for everything else
  • Refs: Password Strength; Credential Stuffing
elephant
"Now what is my password" by Robin Hutton
is licensed under CC BY-NC-ND 2.0

How to Remember these Strong Passwords?

A password manager is a secure, automated, all-digital replacement for the little notepad
that you might have all of your passwords scribbled down in now, but it’s also more than that.
Password managers generate strong new passwords when you create accounts or change a password,
and they store all of your passwords — and, in many cases, your credit card numbers, addresses,
bank accounts, and other information — in one place, protecting them with a single strong primary password.
If you remember your primary password, your password manager will remember everything else,
filling in your username and password for you whenever you log in to a site or app on your phone or computer.

It can proactively alert you when you’re reusing a password or when your passwords are
weak and easy to guess or hack, and some password managers will even let you know when
online accounts are hacked and your passwords have been exposed. For accounts that you need
to share with family members, friends, or co-workers — a joint bank account or mortgage site,
a shared Twitter account, or your insurance and medical records, for instance
— many password managers offer family plans that make it simple to share strong, complex
passwords without requiring multiple people to remember them or write them down.

Learning to use a password manager seems intimidating, but once you start using one
to make strong random passwords that you’re not on the hook to remember, you’ll wonder
how you lived without one. Usually, improving your digital security means making your devices
more annoying to use; a password manager is a rare opportunity to make yourself
more secure and less annoyed.

Before Jumping In...

  • Maybe a password manager sounds great already and you're ready to jump in.
  • If you're not tech savvy, wait until we introduce password managers in more detail in session 2.
  • Otherwise, scan the rest of the course materials yourself,
    paying special attention to a few items to avoid common problems.
  • Password Managers, esp. Getting Started
  • Updating Passwords, esp. Strategy
  • Recovery & User Names, esp. Recovery
  • Wait to enable Multi-factor Authentication on your accounts -- to be covered in session 3.