SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Risks associated with Password based
      Whitepaper
                                 authentication

                                  Password-based authentication is one of the most popular approaches to
                                  authenticate a user in various enterprise applications. But there are many
                                  problems associated with the password based authentication systems and the
                                  risks associated with using passwords as an authentication mechanism for
                                  enterprise applications is not completely secure.

PASSWORD PROBLEM                  Considering all the risks associated with password based authentication
                                  systems, there is a strong need for enterprises to switch to a stronger
The problem that, secure          authentication system which provides security against the various hacking
passwords are difficult to        attacks and also which is more convenient and easier to the end user of the
remember and easy-to-             system
remember passwords are
easy to break in most cases,      Challenges with Password based Authentication:
is referred to as the
                                  1. Easy passwords can be cracked
Password Problem.
                                  The end user’s behaviour such as choosing passwords that are easy to
                                  remember introduces the majority of the password weaknesses. For a hacker,
IDEAL PASSWORD                    these passwords can easily be cracked or guessed. Surveys show that frequent
                                  passwords are the word ‘password’, personal names of family members,
Today from security               names of pets, and dictionary words.
standpoint, the ideal
password is a string of eight
or more random characters,        2. Random passwords can’t be remembered
which includes digits, letters
                                  A random password should not have a content, context, and should not be
with a mixture of upper and
                                  familiar. It can only be learned by using it over and over again. However, since
lower case, and special           repetition is a weak way of remembering, users often completely ignore the
characters, is not a              recommendations for pseudo-random passwords.
dictionary word and is not
related to personal
information, such as social       3. Remembering Multiple Passwords
security number, street
                                  Moreover, today’s users have to remember more than one password for
address, or birth date.
                                  computers, mail accounts, social media applications, online banking, and much
                                  more. A survey of IT professionals found out that the average IT professional
                                  has to remember approximately five to six passwords and almost 25% of the IT
                                  professional has to manage eight or more passwords. The more passwords a
                                  person has to remember, the chances for remembering any specific password
                                  decreases. Having multiple passwords also increases the chance of
                                  interference among similar passwords. This is especially true for systems that
                                  are not used frequently.
Risks associated with Password based authentication - Whitepaper




4. Problems with passwords that needs to be continuously
   changed

Computer systems require frequent password changes, to make the system
robust from various attacks. Common techniques require that passwords are
changed every 30 or 90 days. However, the more frequently a password has to
be changed, the harder it will be to remember. Users must think of new
passwords that conform to all of the organization’s requirements but that are
also easy to remember. System-enforced password policies, however, cannot
guarantee password secrecy.



5. Security vs. Ease-of-Use for Passwords

To “solve” the Password Problem, users will try to decrease the memory
burden at the expense of security. Most commonly, the user will write down
passwords, raising the potential of compromise of the passwords. In the case
of multiple systems, users may choose only one password for all systems. This
reduces security and if the password is broken for one computer system, every
single computer system is compromised. Alternatively, users create their own
rules to generate multiple passwords that have something in common, for
example adding a digit to a base word for each new password, which is also an
unsafe method. Weak passwords can be broken by dictionary attacks or
attacks based on knowledge about the password owner. Because of password-
cracker programs, users need to create unpredictable passwords, which are
more difficult to memorize.



6. Shoulder Surfing Attack

Shoulder surfing is looking over someone’s shoulder when they enter a
password or a PIN code. It is an effective way to get information in crowded
places because it is relatively easy to stand next to someone and watch as they
fill out a form, enter a PIN number at an ATM machine, or use a calling card at
a public pay phone. Shoulder surfing can also be done at a distance with the
aid of binoculars or other vision-enhancing devices to know the password.
Shoulder surfing can be done easily on the password system, just by seeing the
keys that the user types.




                                                                          Page 2
Risks associated with Password based authentication - Whitepaper



7. Keyloggers

       Keyloggers are the best example of a spyware, which are installed on
        the victim machines without user’s knowledge and monitors all the
        keystrokes. Keyloggers can be in one of two different forms - Hardware
        device, Small program (spyware).
       As a hardware device, a Keylogger is a small battery-sized plug that
        serves as a connector between the user's computer and keyboard. As
        the device resembles an ordinary keyboard plug, it is relatively easy to
        physically hide such a device "in plain sight." As the user types, the
        device collects and saves the keystrokes as text in its own memory. At
        a later point of time, the person who installed the Keylogger must
        return and physically remove the device in order to access the
        information the device has gathered.
       On the other hand a Keylogger program does not require physical
        access to the user's computer. It can be downloaded deliberately by
        someone who wants to monitor activity on a particular computer or it
        can be downloaded accidentally as spyware and executed as part of a
        remote administration (RAT) Trojan horse.
       The Keylogger program records each keystroke the user types and
        uploads the information over the Internet periodically to the one
        installed the program. Once the hacker gets the information from
        Keylogger, the hacker can mimic the actual user and there is no way
        the authentication server can distinguish the real user and the hacker.



Conclusion:

Considering all the above factors, password based authentication is no longer
sufficient for the security needs of any enterprise. So there is a growing trend
among many enterprises globally to move to a stronger authentication solution
which provides high level of security with-out compromising the user’s
convenience.       ArrayShield IDAS Two Factor authentication protects
Organizations from Identity and data theft, hence provides peace of mind.




                                                                          Page 3
Risks associated with Password based authentication - Whitepaper




                                            ABOUT ARRAYSHIELD
Array Shield Technologies is the maker of software security products in the
area of Multi-Factor Authentication. The company’s mission is to provide highly
secure, cost effective and easy to use software security solutions globally.

For more information, visit us at www.arrayshield.com




                                                                          Page 4

Más contenido relacionado

Más de ArrayShield Technologies Private Limited (7)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Risks with passwords

  • 1. Risks associated with Password based Whitepaper authentication Password-based authentication is one of the most popular approaches to authenticate a user in various enterprise applications. But there are many problems associated with the password based authentication systems and the risks associated with using passwords as an authentication mechanism for enterprise applications is not completely secure. PASSWORD PROBLEM Considering all the risks associated with password based authentication systems, there is a strong need for enterprises to switch to a stronger The problem that, secure authentication system which provides security against the various hacking passwords are difficult to attacks and also which is more convenient and easier to the end user of the remember and easy-to- system remember passwords are easy to break in most cases, Challenges with Password based Authentication: is referred to as the 1. Easy passwords can be cracked Password Problem. The end user’s behaviour such as choosing passwords that are easy to remember introduces the majority of the password weaknesses. For a hacker, IDEAL PASSWORD these passwords can easily be cracked or guessed. Surveys show that frequent passwords are the word ‘password’, personal names of family members, Today from security names of pets, and dictionary words. standpoint, the ideal password is a string of eight or more random characters, 2. Random passwords can’t be remembered which includes digits, letters A random password should not have a content, context, and should not be with a mixture of upper and familiar. It can only be learned by using it over and over again. However, since lower case, and special repetition is a weak way of remembering, users often completely ignore the characters, is not a recommendations for pseudo-random passwords. dictionary word and is not related to personal information, such as social 3. Remembering Multiple Passwords security number, street Moreover, today’s users have to remember more than one password for address, or birth date. computers, mail accounts, social media applications, online banking, and much more. A survey of IT professionals found out that the average IT professional has to remember approximately five to six passwords and almost 25% of the IT professional has to manage eight or more passwords. The more passwords a person has to remember, the chances for remembering any specific password decreases. Having multiple passwords also increases the chance of interference among similar passwords. This is especially true for systems that are not used frequently.
  • 2. Risks associated with Password based authentication - Whitepaper 4. Problems with passwords that needs to be continuously changed Computer systems require frequent password changes, to make the system robust from various attacks. Common techniques require that passwords are changed every 30 or 90 days. However, the more frequently a password has to be changed, the harder it will be to remember. Users must think of new passwords that conform to all of the organization’s requirements but that are also easy to remember. System-enforced password policies, however, cannot guarantee password secrecy. 5. Security vs. Ease-of-Use for Passwords To “solve” the Password Problem, users will try to decrease the memory burden at the expense of security. Most commonly, the user will write down passwords, raising the potential of compromise of the passwords. In the case of multiple systems, users may choose only one password for all systems. This reduces security and if the password is broken for one computer system, every single computer system is compromised. Alternatively, users create their own rules to generate multiple passwords that have something in common, for example adding a digit to a base word for each new password, which is also an unsafe method. Weak passwords can be broken by dictionary attacks or attacks based on knowledge about the password owner. Because of password- cracker programs, users need to create unpredictable passwords, which are more difficult to memorize. 6. Shoulder Surfing Attack Shoulder surfing is looking over someone’s shoulder when they enter a password or a PIN code. It is an effective way to get information in crowded places because it is relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done at a distance with the aid of binoculars or other vision-enhancing devices to know the password. Shoulder surfing can be done easily on the password system, just by seeing the keys that the user types. Page 2
  • 3. Risks associated with Password based authentication - Whitepaper 7. Keyloggers  Keyloggers are the best example of a spyware, which are installed on the victim machines without user’s knowledge and monitors all the keystrokes. Keyloggers can be in one of two different forms - Hardware device, Small program (spyware).  As a hardware device, a Keylogger is a small battery-sized plug that serves as a connector between the user's computer and keyboard. As the device resembles an ordinary keyboard plug, it is relatively easy to physically hide such a device "in plain sight." As the user types, the device collects and saves the keystrokes as text in its own memory. At a later point of time, the person who installed the Keylogger must return and physically remove the device in order to access the information the device has gathered.  On the other hand a Keylogger program does not require physical access to the user's computer. It can be downloaded deliberately by someone who wants to monitor activity on a particular computer or it can be downloaded accidentally as spyware and executed as part of a remote administration (RAT) Trojan horse.  The Keylogger program records each keystroke the user types and uploads the information over the Internet periodically to the one installed the program. Once the hacker gets the information from Keylogger, the hacker can mimic the actual user and there is no way the authentication server can distinguish the real user and the hacker. Conclusion: Considering all the above factors, password based authentication is no longer sufficient for the security needs of any enterprise. So there is a growing trend among many enterprises globally to move to a stronger authentication solution which provides high level of security with-out compromising the user’s convenience. ArrayShield IDAS Two Factor authentication protects Organizations from Identity and data theft, hence provides peace of mind. Page 3
  • 4. Risks associated with Password based authentication - Whitepaper ABOUT ARRAYSHIELD Array Shield Technologies is the maker of software security products in the area of Multi-Factor Authentication. The company’s mission is to provide highly secure, cost effective and easy to use software security solutions globally. For more information, visit us at www.arrayshield.com Page 4