Password Security
David Groth's "Network+ Study Guide" says this about choosing passwords:
"Do not use just a regular word preceded or ended by a special character.
Good crack programs strip off the leading and trailing characters in their
decryption attempts."
This confuses me. How could a crack program strip off leading and trailing
characters? I thought that crack programs only try to guess. Do the programs simply try to guess what leading and trailing characters might be and add them to their dictionary words?
The guide also says that passwords should be changed every 30 days or so, as many sources recommend. But the more I think about this, the less sense it makes. If a password is strong, what's the point of changing it? If a password has been cracked or leaked, wouldn't it be exploited immediately? Wouldn't it be too late to change a password once the security has been compromised? This policy could allow crackers a month of unauthorized access.
It seems to me the real issue would be how the password was known in the first place. Either it was not a strong password or someone was careless with it. Changing the password every 30 days would be side-stepping the real problem of insecure passwords. It's like changing the locks on your doors every month rather than getting better locks. Can anyone set me straight? Thanks.
"Do not use just a regular word preceded or ended by a special character.
Good crack programs strip off the leading and trailing characters in their
decryption attempts."
This confuses me. How could a crack program strip off leading and trailing
characters? I thought that crack programs only try to guess. Do the programs simply try to guess what leading and trailing characters might be and add them to their dictionary words?
The guide also says that passwords should be changed every 30 days or so, as many sources recommend. But the more I think about this, the less sense it makes. If a password is strong, what's the point of changing it? If a password has been cracked or leaked, wouldn't it be exploited immediately? Wouldn't it be too late to change a password once the security has been compromised? This policy could allow crackers a month of unauthorized access.
It seems to me the real issue would be how the password was known in the first place. Either it was not a strong password or someone was careless with it. Changing the password every 30 days would be side-stepping the real problem of insecure passwords. It's like changing the locks on your doors every month rather than getting better locks. Can anyone set me straight? Thanks.
Comments
-
Webmaster Admin Posts: 10,292 AdminI noticed your post has been answered in the alt network+ newsgroup already, but here goes:orthicon wrote:Do the programs simply try to guess what leading and trailing characters might be and add them to their dictionary words?If a password has been cracked or leaked, wouldn't it be exploited immediately?Wouldn't it be too late to change a password once the security has been compromised?This policy could allow crackers a month of unauthorized access.
On a side note: I worked at several large enterprises and 60 days is more common than 30.It seems to me the real issue would be how the password was known in the first place. Either it was not a strong password or someone was careless with it. Changing the password every 30 days would be side-stepping the real problem of insecure passwords. It's like changing the locks on your doors every month rather than getting better locks.
Obviously the authentication method (the "lock") used in this situation is username/password, if you have to deal with that (because the company can't afford to, or simply won't buy smartcards or a full-blown biometric system using finger prints and facial recognition) the practice of changing the password regularly is widely accepted as good practice.
Remember though that there are no 100% secure locks available, all available locks offer "some security".
Not sure if it is the same in the US, but our pay TV system uses a "decoder" that changes the code frequently... they don't know many people are watching their channel without paying using a home-build decoder, they just assume...Can anyone set me straight? Thanks
You're welcome -
RussS Member Posts: 2,068 ■■■□□□□□□□Excellent explaination Webmasterwww.supercross.com
FIM website of the year 2007