October 8th, 2012Top StoryWeighing Security Against Convenience: What Works, What Doesn't, and What's Best for YouBy Adam Dachis
Over the years, we've posted several password security tips, tricks and techniques ranging from the simply memorable to the perfectly paranoid. Although I've always used strong passwords, many of my coworkers went through great lengths to heighten their security far beyond mine. I knew my passwords needed an audit, but the security measures put forth by my colleagues seemed so frustrating and inconvenient. I wanted safety but without all the hassle. To find out the best combination of security and convenience, I decided to audit all the methods we recommend with the help of security and investigations expert Brandon Gregg. Before we can get started, however, we need to know what makes our passwords vulnerable. The Three Variables That Contribute to Weak Passwords
*GPUs or graphics cards are used to brute force passwords due to how they tackle parallel calculations. One GPU or clusters of GPUs can be made fairly cheaply and are multiple times faster at guessing passwords than their CPU brothers. Eliminating one or two of the three variables doesn't require much effort, but removing all three causes the higher level of inconvenience I, and many people, hope to avoid. While no security strategy lacks vulnerabilities, in this post we'll audit several types of passwords, from weak and strong and methods of managing them to find out what's the best for convenience and what's the best for security. The Four Levels of Password SecurityLeast Secure: Simple Alphanumeric Passwords
That said, you won't forget a simple password. If you use it for every account you own, you won't have to remember much at all. Of course, this is extremely insecure. If using a simple and short password, especially across many accounts, you're not far off from using no password at all. For more on why weak passwords are easy to crack, read this. Examples: charlie, hotstuff, 8675309, mary212 Somewhat Secure: Complex 8+ Character Passwords
This method fails when you use a unique password for every site because you have to remember many, many complex strings of letters, numbers, and symbols. Examples: t@lk4Ev3r!, iLuVg0@ts, b3stFr13ndS4eVer?! Very Secure: A Common Complex Base Password with Unique Identifiers
Examples: iLuVg0@ts-gmail, iLuVg0@ts-linkedin, iLuVg0@ts-facebook Of course, if a savvy hacker managed to crack one password they might figure out the others. Brandon suggests:
Examples: iLuVg0@ts-email, iLuVg0@ts-resume, iLuVg0@ts-friends With common basename passwords, you have another secure option: using a three word phrase with spaces (e.g. "goats love gmail"). This method may seem less secure because it includes simple dictionary words, but it works because spaces are in play. (You can read more about the three word method here.) Brandon notes that this method sometimes fails because of how sites and applications restrict your password options:
Examples: goats love gmail, goats@love@facebook, goats!love!pinterist As mentioned, neither solution comes without vulnerabilities. If all your sites allow spaces or don't restrict special characters, the three word method offers greater simplicity. Either way, a common base password and a unique identifier offers both security and convenience. Extremely Secure: Two-Factor Authentication and Passwords Even You Don't Know
Using a password manager suffers from a similar vulnerability to using the same password for every site: you crack one, you crack them all. While LastPass, in particular, makes great efforts to keep your passwords safe, you're putting yourself at risk by using one password to rule them all. The solution? Two-factor authentication, something you may have heard about recently. Brandon explains how it works:
When using a password manager like LastPass, you should enable two-factor authentication or you are, as Brandon puts it, potentially offering up your passwords as a nicely wrapped present. While we often argue this method secures your accounts better than any method, it also creates the most inconvenience. You'll need to decided whether that inconvenience matters to you or not. How Do I Choose the Best Password Security for Me?
Personally, I find this method excessive and too much of a burden. As a result, I've opted for our third level of security ("Very Secure") described above for two reasons. First, using a method that requires a password manager involves trusting someone else with your data. When you give someone else your data you take a risk that they may lose it or share it (whether intentionally or not). If you've ever told a friend a secret, you understand the potential risk. The only well-kept secret is the one you keep yourself. While you can't avoid sharing your information entirely, as that would lead to a horribly insulated life, I believe in keeping how much you share that information to a minimum. Second, I want reasonably easy access to my data and I'm okay with assuming some risk. As someone who's had his fair share of hardships, I don't believe in trying to live life risk-free. Bad things happen. We should take reasonable measures to prevent them, but sometimes they still happen. To me, a tiny bit of added security isn't worth the inconvenience. What should you choose? Brandon sums up the decision-making process nicely:
The level of risk you want to take depends on your personal needs and the level of risk you're willing to take. Just remember—while you can implement extreme security protocols, nothing prevents the possibility of a hack. Everything is vulnerable. Back up your data. Keep a close eye on your accounts. Security involves more than locking everything down with good passwords. You should prepare yourself for the worst. In the meantime, however, lock down your accounts in a way that's secure enough for you and fits well into your life. Special thanks to Brandon Gregg for his expert advice. Brandon has worked investigations for numerous Fortune 500 companies over the last 12 years investigating theft, fraud, organized crime, corporate espionage, and many high profile cases as well as being an educator, published author, and featured speaker on surveillance, computer forensics, complex investigations, and ethical hacking. You can find out more about him here. Photos by edel (Shutterstock) andStock Elements (Shutterstock). |
|
A destination on the Interweb to brighten your day (now get back to work!)
Monday, October 8, 2012
Weighing Security Against Convenience: What Works, What Doesn't, and What's Best for You
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment