{"id":419,"date":"2010-08-27T00:16:54","date_gmt":"2010-08-27T04:16:54","guid":{"rendered":"http:\/\/clay.blogdns.net\/?p=419"},"modified":"2010-10-09T10:24:45","modified_gmt":"2010-10-09T14:24:45","slug":"computer-security-and-the-human-factor","status":"publish","type":"post","link":"https:\/\/claymccauley.info\/index.php\/2010\/08\/27\/computer-security-and-the-human-factor\/","title":{"rendered":"Computer security and the human factor"},"content":{"rendered":"<p>One of the most important things to remember about security is that it is a process, not a product.\u00a0 All too often, people think of security as a specific problem with a specific solution.\u00a0 Unfortunately for us, security (in almost any context) is a moving target.\u00a0 What was a strong password yesterday is weak today.\u00a0 There are good reasons to require users to change their passwords, but it&#8217;s only part of the solution.\u00a0 Forcing user&#8217;s to change their password too often invariably results in weaker passwords that are easier to remember.<\/p>\n<p>To understand why this is a problem we first need to define what a strong password is and what makes one weak.\u00a0 Numeric passwords are the worst as there are only 10^N possibilities where N is the number of characters.\u00a0 Using letters is a little better as that&#8217;s 26^N for english.\u00a0 Using both upper and lower case gives you 52^N, while a full alphanumeric set gives you 62^N.\u00a0 Use of a full alphanumeric characterset on passwords 8-characters and higher was considered strong enough until recently.\u00a0 After all, 218 trillion possibilities seems pretty large doesn&#8217;t it?\u00a0 Considering some of today&#8217;s high-end graphics cards can perform over 2 trillion floating point operations per-second, breaking even a completely random 8-character alphanumeric password is trivial.\u00a0 Adding the full set of special characters\u00a0\u00a0 on most english keyboards yields an additional 30 characters for 92^N or 5 quadrillion possibilities for an 8-character password.<\/p>\n<p>You&#8217;re probably noticing a problem; we&#8217;re out of usable characters.\u00a0 From this point on, the only way to increase password security is to make them longer and longer.\u00a0 Obviously we can only keep up with this for so long before technology overtakes our ability to remember a secure password.\u00a0 Clearly simple password-based security is insufficient for protecting anything of real value.\u00a0 What&#8217;s needed is a multifactor system that uses 2 or more separate components to authenticate a user&#8217;s credentials.<\/p>\n<p>A multifactor authentication system could be as simple as the combination of a password and a physical token such as a smartcard.\u00a0 To authenticate, the user must insert the smartcard and type his or her password.\u00a0 Either factor by itself will be rejected.\u00a0 The beauty of this system is that any data protected in this way is inaccessible without each piece of the authentication puzzle.<\/p>\n<p>A system is only as secure as its weakest link.\u00a0 In many cases we humans are unfortunately that link.\u00a0 We have limited memory and are vulnerable to social engineering attacks that get us to reveal sensitive information to complete strangers.\u00a0 A strong password is useless if a user gives that password away or writes it down.\u00a0 Adding a unique physical component to the equation raises the level of difficulty for an attacker significantly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most important things to remember about security is that it is a process, not a product.\u00a0 All too often, people think of security as a specific problem with a specific solution.\u00a0 Unfortunately for us, security (in almost &hellip; <a href=\"https:\/\/claymccauley.info\/index.php\/2010\/08\/27\/computer-security-and-the-human-factor\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[137,138,84],"class_list":["post-419","post","type-post","status-publish","format-standard","hentry","category-tech","tag-authentication","tag-password","tag-security"],"_links":{"self":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":5,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/posts\/419\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claymccauley.info\/index.php\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}