Question

In: Computer Science

Case study adapted from: [Brooks hear. ICT Services Management (Custom Edition EBook), Pearson Education Australia, 2015....

Case study adapted from: [Brooks hear. ICT Services Management (Custom Edition EBook), Pearson Education Australia, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com] Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each time he or she needs access to the resource. Unfortunately, the reusable password is the weakest form of authentication, and it is appropriate only for the least sensitive assets. Ease of Use and Low Cost: The popularity of password authentication is hardly surprising. For users, passwords are familiar and relatively easy to use. For corporate IT departments, passwords add no cost because operating systems and many applications have built-in password authentication. Dictionary Attacks The main problem with passwords is that most users pick very weak passwords. To break into a host by guessing and trying passwords, hackers often use password dictionaries. These are lists of passwords likely to succeed. Running through a password dictionary to see if a password is accepted for a username is called a dictionary attack. Password dictionaries typically have three types of entries: a list of common password, the words in standard dictionaries, and hybrid versions of words such as capitalizing the first letter and adding a digit at the end. If a password is in one of these dictionaries, the attacker may have to try a few thousand passwords, but this will only take seconds. No password that is in a cracker dictionary is adequately strong, no matter how long it is. Fortunately, good passwords cannot be broken by dictionary attacks. Good passwords have two characteristics. First, they are complex. It is essential to have a mix of upper and lower case letters that does not have a regular pattern such as alternating uppercase letters lowercase letters. It is also good— and some would say necessary— to include non-letter keyboard characters such as the digits (0 through 9) and other special characters (&, #./,?, etc.). If a password is complex, it can only be cracked by a brute-force attack, in which the cracker first tries all combinations of one character passwords, all combinations of two-character passwords, and so forth, until the attacker finds one that works. Complexity is not enough, however. Complex passwords must also be long. For short complex passwords, brute force attacks will still succeed. Beyond about 10 or 12 characters, however, there are too many combinations to try in a reasonable period of time. Overall, while long complex passwords can defeat determined attacks, most users select passwords that can be cracked with dictionary attacks. Reusable passwords are no longer appropriate in an era when password cracking programs can reveal most passwords in seconds or minutes. Passwords are only useful for non-sensitive assets.

Answer the following questions: 1. Discuss and explain the types of passwords are susceptible to dictionary attacks? [5 marks]

2. Can a password that can be broken by a dictionary attack be adequately strong if it is very long? Justify your answer. [5 marks]

3. Explain the types of passwords can be broken only by brute-force attacks. [5 marks]

4. What are the characteristics of passwords that are safe from even brute-force attacks? [5 marks]

5. Discuss why is it undesirable to use reusable passwords for anything but the least sensitive assets

Solutions

Expert Solution

1. Discuss and explain the types of passwords are susceptible to dictionary attacks?

Password:  

A password or passcode is referred to as a secret string of characters which is used to confirm the identity of a user.

It generally includes letters,digits and other symbols.It does not need to be an actual word and can be a nonword and hard to guess,which is a desirable property of passwords.

Dictionary attacks:

This is a bruteforce technique where hacker tries thousands of possibilities such as words in dictionary or previously used passwords,which can be obtained from lists of past security breaches.

The main problem with passwords is that most users pick very weak passwords. To break into a host by guessing and trying passwords, hackers often use password dictionaries. These are lists of passwords likely to succeed. Running through a password dictionary to see if a password is accepted for a username is called a dictionary attack. Password dictionaries typically have three types of entries:

a list of common password,

the words in standard dictionaries

and hybrid versions of words such as capitalizing the first letter and adding a digit at the end. If a password is in one of these dictionaries, the attacker may have to try a few thousand passwords, but this will only take seconds.

2. Can a password that can be broken by a dictionary attack be adequately strong if it is very long? Justify your answer.

No password that is in a cracker dictionary is adequately strong, no matter how long it is. Fortunately, good passwords cannot be broken by dictionary attacks.

Good passwords have two characteristics. First, they are complex. It is essential to have a mix of upper and lower case letters that does not have a regular pattern such as alternating uppercase letters lowercase letters. It is also good— and some would say necessary— to include non-letter keyboard characters such as the digits (0 through 9) and other special characters (&, #./,?, etc.).

For Example ::If a password is in the form of Malini123@ ,Malini being in your name or surname or somewhere in your user profile,then it can be easily cracked by the hacker.The password may be long and contains all the needed characteristics,still the hacker hacks it.

Take another example UnDeRsTaNd1981#,this one is a more complex to crack as the password contains both lower case and uppercase and the numbers that are not in a sequence.

@ is the most commonly used special symbol either at the start or end of passwords.

So,being complex doesn't make the password safe from dictionary attacks.

3. Explain the types of passwords can be broken only by brute-force attacks.

Bruteforce attack

A bruteforce attack is a technique where an attacker submits many passwords or passphrases with the hope of guessing the correct one eventually.The attacker systematically check all the possibilities until he guesses the correct one.

The passwords that are complex can only be cracked by using brute-force attacks.

the cracker first tries all combinations of one character passwords, all combinations of two-character passwords, and so forth, until the attacker finds one that works. Complexity is not enough, however. Complex passwords must also be long.

For short complex passwords, brute force attacks will still succeed. Beyond about 10 or 12 characters, however, there are too many combinations to try in a reasonable period of time.

4. What are the characteristics of passwords that are safe from even brute-force attacks?

Strong passwords

If you’re a network administrator, you can help prevent successful brute force attacks by requiring that users input strong passwords. For example, you could require a certain length and that the password contains specific features, such as a mix of upper and lower case letters along with numbers and special characters.

From a user perspective, a strong password is imperative. Using a common password or a simple word from a dictionary will make it far easier for a brute force attack tool to land on the right one. Coming up with a solid password can be difficult, but here are a few tips:

  • Longer passwords are better as it will take a sequential tool longer to run through the iterations.
  • Using a combination of upper and lower case letters, numbers, and special characters will make a password stronger.
  • Never using the same password for different accounts will make you less vulnerable to certain types of attack.

Of course, coming up with and remembering strong passwords can be difficult, but there are tools to help you. These include password generators, password strength testing tools, and password management applications

5. Discuss why is it undesirable to use reusable passwords for anything but the least sensitive assets

Reusable passwords are no longer appropriate in an era when password cracking programs can reveal most passwords in seconds or minutes. Passwords are only useful for non-sensitive assets.

Reusable Passwords :

If a user uses a same password for all the accounts including email,social networks,bank accounts,office logins etc,then such passwords are called as reusable passwords.

It may be easy for the user to remember the password,but the attacker can easily crack the passcode.

Using one password for everything is convenient, but it’s also dangerously insecure. We examine the case of Mark, a young designer.

Mark is a regular guy. He has e-mail, Facebook, Instagram, Amazon, eBay, Steam, and Battle.net accounts, not to mention ones for another dozen online stores and a forum dedicated to his favorite video game. The accounts are all linked to his e-mail.

One day, the customer database of one of the online stores Mark has an account at suffers a leak (apparently it was kept unencrypted on an open-access server). No credit card information is stolen, but e-mail addresses, names, and passwords are. At first glance, there seems no particular reason to worry. Such leaks happen, and this is just a small online store — can you blame a humble shopkeeper for not being a cybersecurity expert?

But the cybercriminals who ransacked the database decide to try their luck — maybe someone on the list uses the same password for their e-mail account? They strike gold: Mark uses the same password everywhere, handing the cybercriminals access to his e-mail on a platter. There, they find not only photos that Mark sent to Lucy, but messages from Amazon, eBay, and other companies. Surely Mark doesn’t use the same password for these accounts too? They try logging in to his Amazon account, and presto: same password again.

Finding a credit card already linked to the Amazon account, the cybercriminals quickly snag a couple of iPhone Xs. Next up is Facebook, where the attackers ask Mark’s friends for money: “Guys, I really need to borrow some cash. I get paid tomorrow, so I’ll pay you right back, promise.” Some of the people who get the message really are Mark’s friends, and send money — to the cybercriminals’ account, of course.

But they haven’t finished yet. The intruders now change the passwords for every account they can access, which in Mark’s case means all of them.

One of the Facebook friends smells a rat and decides to phone Mark to check if it’s really him asking for a loan. Horrified, Mark rushes to his computer to change his Facebook password. But it’s already been changed by the cybercriminals, and Mark is locked out. He tries to recover the password and asks Facebook to send him a password reset link by e-mail — but he can’t access that either, for the same reason.

Mark realizes that he’s been well and truly hacked. He calls his bank, freezes credit cards, tries desperately to change the passwords for the few services that haven’t been snatched yet, and phones his friends to explain that it’s not him asking for money. He apologizes to those who have already transferred funds to the scammers, and vows to pay it all back.

And finally, Mark solemnly swears that he shall never use the same password for different services ever again for as long as he lives, and he’ll enable two-factor authentication wherever possible. (This case study is taken from Kaspersky blog)

So, it may be fine to use same password for less sensitive assets,example being some social networking sites or some login to blogs etc., but the office login,shopping ,email,accounts of banks must be always different from one another.

As the reusable passwords are prone to dictionary attacks and bruteforce attacks ,these are considered to be appropriate only for the least sensitive assets.


Related Solutions

Read and study all the material and the Case Study: American Investment Management Services Read and...
Read and study all the material and the Case Study: American Investment Management Services Read and study all the material and the Case Study: American Investment Management Services in Week 9 before beginning the final exam. “Exhibits” are found in that Case. Then answer the following questions about the Case Study: American Investment Management Services: #3. Noting that excess capacity is charged back to active accounts, if AIMS scaled back to 3,000,000 active households and planned only a 10% excess...
Read and study all the material and the Case Study: American Investment Management Services in Week...
Read and study all the material and the Case Study: American Investment Management Services in Week 9 before beginning the final exam. “Exhibits” are found in that Case. Then answer the following questions about the Case Study: American Investment Management Services: #3. Noting that excess capacity is charged back to active accounts, if AIMS scaled back to 3,000,000 active households and planned only a 10% excess capacity reserve for future growth, a large proportion of cost could be eliminated. Estimate...
This case study is from the Corporate Finance book, chapter 8 in the eBook (pg. 653...
This case study is from the Corporate Finance book, chapter 8 in the eBook (pg. 653 in the hard copy, page 261 in eBook). The case study will require you to perform a financial analysis and make some capital investment decisions for Bethesda Mining Company. You will need to prepare various operating cash flows in order to perform your analysis and make a recommendation. The case study is also stated below. Please complete the case study using the excel template...
General This case study is from the Corporate Finance book, chapter 8 in the eBook (pg....
General This case study is from the Corporate Finance book, chapter 8 in the eBook (pg. 653 in the hard copy, page 261 in eBook). The case study will require you to perform a financial analysis and make some capital investment decisions for Bethesda Mining Company. You will need to prepare various operating cash flows in order to perform your analysis and make a recommendation. The case study is also stated below. Please complete the case study using the excel...
The project is adapted from the Chapter 4 Case Study dealing with North–South Airline In January...
The project is adapted from the Chapter 4 Case Study dealing with North–South Airline In January 2012, Northern Airlines merged with Southeast Airlines to create the fourth largest U.S. carrier. The new North–South Airline inherited both an aging fleet of Boeing 727-300 aircraft and Stephen Ruth. Stephen was a tough former Secretary of the Navy who stepped in as new president and chairman of the board. Stephen’s first concern in creating a financially solid company was maintenance costs. It was...
Westinghouse Electric Takes On The Risks Of A “Big Bang” Project Case study adapted from: [David...
Westinghouse Electric Takes On The Risks Of A “Big Bang” Project Case study adapted from: [David Hannon, “Westinghouse Electric Company Sees Global Standard Processes as the Foundation for Future Business Success,” SAP Insider PROFILES, January– March 2020 and www. westinghousenuclear.com, accessed August 14, 2020. A Westinghouse Electric Company provides fuel, services, technology, plant design, and equipment to utility and industrial customers in the worldwide commercial nuclear electric power industry. A private company created in 1999 after its predecessor was sold...
QUESTION 6 – CASE STUDY II [5+5+5+5+5 = 25 Marks] Reusable Passwords Case study adapted from:...
QUESTION 6 – CASE STUDY II [5+5+5+5+5 = 25 Marks] Reusable Passwords Case study adapted from: [Brooks hear. ICT Services Management (Custom Edition EBook), Pearson Education Australia, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com] Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each...
Case Study Case History Abioye Akachi, a 5 y.o. boy, recently arrived in Australia from East...
Case Study Case History Abioye Akachi, a 5 y.o. boy, recently arrived in Australia from East Africa. Brought to the Emergency Dept. by his worried parents, who state that he has frequent infections, a poor appetite, appears to be in pain, is pale and lethargic. On examination the clinician finds an irritable child with jaundice, splenomegaly and failure to thrive. The clinician requests an FBE, ESR, CRP, Haptoglobin, Blood film, Malaria screen, Renal and Liver function tests and to crossmatch...
Scenario 3: Typhoid in Tajikistan *adapted from: Stehr-Green, JK. Typhoid in Tajikistan A Classroom Case Study...
Scenario 3: Typhoid in Tajikistan *adapted from: Stehr-Green, JK. Typhoid in Tajikistan A Classroom Case Study STUDENT’S VERSION. Centers for Disease Control and Prevention. November 2010. Accessed March 29, 2020 Based on the information given, what do you anticipate the challenges will be for this outbreak? What plan of action would you take in order to address the outbreak from an Interprofessional standpoint? How does the countries’ history of economic hardship and unrest affect the problem?
Case Study 1 Reference: Hutt, M. & Speh, T. (2014), Business Marketing Management: B2B (11th edition),...
Case Study 1 Reference: Hutt, M. & Speh, T. (2014), Business Marketing Management: B2B (11th edition), South-Western Cengage Learning. Chapter 6 – Case Study page. 171-172 Schwinn: Could the Story Have Been Different? At its peak, Schwinn had more than 2000 U.S. employees, produced hundreds of thousands of bicycles in five factories, and held 20 percent of the market. Today, however, Schwinn no longer exists as an operating company. The firm, founded in 1895, declared bankruptcy in 1992 and closed...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT