Sins of Use of Weak passwords Flashcards
What is a major flaw of password-based systems?
Passwords are a portable single-factor authentication method, which means users can be tricked, bribed, or coerced into revealing them.
Why is using weak passwords a security risk?
Weak passwords can be easily guessed by attackers. Examples include “password”, “1234”, or using the username as the password.
What should you enforce to prevent the use of weak passwords?(in your application/web et al.)
Enforce password complexity and length requirements, and ensure the username is not included in the password.
What are iterated passwords and why are they a security risk?
Iterated passwords include sequences like “password1”, “password2”, which are easy to guess due to their predictable patterns.
What is a recommended practice to handle iterated passwords?
Implement password history tracking and ensure passwords cannot be slightly modified versions of previous passwords.
Why is it problematic to never change a password?
Not changing passwords regularly can increase the risk of unauthorized access if a password is compromised.
What are some defenses against the risk of never changing passwords?
Require regular password changes and track password history to prevent reuse.
What are default passwords and why are they dangerous?
Default passwords are preset passwords given to new users or devices, which can be easily exploited if not changed.
How can you mitigate the risks associated with default passwords?
Avoid using default passwords. If necessary, lock the system until a new password is set and prevent remote logins if the default password hasn’t been changed.
What is a replay attack?
A replay attack occurs when an attacker intercepts network traffic and resends it to gain unauthorized access.
How can you defend against replay attacks?
Use SSL/TLS or IPSec to protect authentication attempts.
Why should passwords not be stored in cleartext?
Storing cleartext passwords can lead to serious security breaches if the storage system is compromised.
What is the recommended method for storing passwords?
Store passwords using a strong hashing algorithm with a sufficient amount of salt.
What is a brute-force attack?
A brute-force attack uses computational power to try many password combinations until the correct one is found.
How can you protect against brute-force attacks on password verifiers?
Use a key derivation function like PBKDF2, configure iterations, and use a large amount of salt.