Sins of Use of Weak passwords Flashcards

1
Q

What is a major flaw of password-based systems?

A

Passwords are a portable single-factor authentication method, which means users can be tricked, bribed, or coerced into revealing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is using weak passwords a security risk?

A

Weak passwords can be easily guessed by attackers. Examples include “password”, “1234”, or using the username as the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should you enforce to prevent the use of weak passwords?(in your application/web et al.)

A

Enforce password complexity and length requirements, and ensure the username is not included in the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are iterated passwords and why are they a security risk?

A

Iterated passwords include sequences like “password1”, “password2”, which are easy to guess due to their predictable patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a recommended practice to handle iterated passwords?

A

Implement password history tracking and ensure passwords cannot be slightly modified versions of previous passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it problematic to never change a password?

A

Not changing passwords regularly can increase the risk of unauthorized access if a password is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some defenses against the risk of never changing passwords?

A

Require regular password changes and track password history to prevent reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are default passwords and why are they dangerous?

A

Default passwords are preset passwords given to new users or devices, which can be easily exploited if not changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you mitigate the risks associated with default passwords?

A

Avoid using default passwords. If necessary, lock the system until a new password is set and prevent remote logins if the default password hasn’t been changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a replay attack?

A

A replay attack occurs when an attacker intercepts network traffic and resends it to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you defend against replay attacks?

A

Use SSL/TLS or IPSec to protect authentication attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should passwords not be stored in cleartext?

A

Storing cleartext passwords can lead to serious security breaches if the storage system is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the recommended method for storing passwords?

A

Store passwords using a strong hashing algorithm with a sufficient amount of salt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a brute-force attack?

A

A brute-force attack uses computational power to try many password combinations until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you protect against brute-force attacks on password verifiers?

A

Use a key derivation function like PBKDF2, configure iterations, and use a large amount of salt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it a bad practice to reveal whether a login failure is due to an incorrect username or password?

A

Revealing specific failure reasons can help attackers refine their guessing strategies.

17
Q

How should you handle error messages for login failures?

A

Provide a generic error message that doesn’t specify whether the username or password was incorrect

18
Q

What are some effective mechanisms to prevent online password guessing attacks?

A

Implement account lockouts and graduated timeouts for repeated failed login attempts.

19
Q

Why should you reset rather than return forgotten passwords?

A

Returning forgotten passwords implies storing them, which is insecure. Resetting them ensures users receive a new, secure password.

20
Q

What are one-time passwords and why are they useful?

A

One-time passwords are temporary and can reduce the risk of capture when logging in from public or shared devices.

21
Q

What are some best practices for handling password security in applications?

A

Use SSL/TLS for authentication, log failed attempts, enforce strong password policies, avoid default passwords, and use secure hash functions for password storage.

22
Q

How can you ensure passwords are not unnecessarily snoopable over the network during authentication?

A

Tunnel the authentication protocol over SSL/TLS.

23
Q

What is a secure practice for storing passwords?

A

Use a strong salted cryptographic one-way function based on a hash for password storage.

24
Q

How should you handle password changes for users who know their current passwords?

A

Provide a secure mechanism for users to change their passwords.

25
Q

What should you avoid in your customer support process regarding password resets?

A

Avoid making it easy for customer support to reset passwords over the phone.

26
Q

What is a recommended storage algorithm for passwords that supports making the one-way hash computationally expensive?

A

Consider using PBKDF2 for password storage.

27
Q

What should you avoid logging in your back-end infrastructure?

A

Avoid storing plaintext passwords and logging failed passwords.

28
Q

What should you do to protect the logon page from phishing attacks?

A

Protect the logon page with SSL/TLS.

29
Q
A