- 论坛徽章:
- 0
|
Secrets to the best passwords\r\n\r\n\r\nBy Peter H. Gregory\r\nJULY 14, 2003\r\n\r\n\r\n\r\n\r\n\r\nThe use of good, hard-to-guess passwords can make it difficult for a malicious hacker to break into your computer account. Avoiding predictable keywords and using different methods to introduce variety into your passwords makes it easy for you to remember them but virtually impossible for others to guess them. \r\nHere are some tips on creating winning passwords.\r\n\r\nUse keywords related to a theme. Choose a common, significant event: a honeymoon, the birth of a child, a new car, a new job.\r\n\r\nExample phrases associated with a birth might be blueeyes, hurry, onemorepush, crankyRN, coldbracelet, roomsix and icechips. Ideas associated with a new car could be deepblue, 6CDs, 5speed and TiresThatGrip.\r\n\r\nThe idea here is that you use a variety of words associated with an event that other people would not readily guess. Remember that you may also need to mix in uppercase letters and numbers when you create a new password. For instance, \"hurry\" could become hUrry66 or Hur5ry.\r\n\r\nSubstitute numbers for letters based upon their appearance. With a little imagination, you can visualize numbers that bear resemblance to letters.\r\n\r\nNumber Letter \r\n1 L \r\n2 Z \r\n3 E \r\n4 A \r\n5 S \r\n6 b \r\n7 Z \r\n8 B \r\n9 g \r\n0 O \r\n\r\n\r\n\r\n\r\nWhen you create a password, substitute a number where a letter would appear, according to the chart above. Some examples: \r\nscuba becomes 5cu8a \r\nwater becomes w4t3r \r\nicecream becomes 1c3cr34m\r\nSubstitute numbers for letters based upon their location on the keyboard. The uppermost row of letters on the keyboard, QWERTYUIOP, has a row of numbers right above it: 1234567890. You can substitute a number for a corresponding letter according to this chart. \r\n\r\nNumber Letter \r\n1 Q \r\n2 W \r\n3 E \r\n4 R \r\n5 T \r\n6 Y \r\n7 U \r\n8 I \r\n9 O \r\n0 P \r\n\r\n\r\n\r\nSo when you create a password, carry out the substitution from the chart. Some examples: \r\nscuba becomes sc7ba \r\npurple becomes 07r0l3 \r\nrocket becomes 49ck35 \r\nConsistently capitalize the nth letter(s) of your password. Some systems require that at least one character be uppercase. Many people capitalize the first character, but this is too predictable. Instead, always capitalize the second, third or fourth letter, or perhaps always the last or next-to-last. Some examples: huRry, roCky, puRple, roCket. \r\nFor further interest, you can capitalize more than one letter, for instance the first and third, or the second and fourth.\r\n\r\nAvoid predictable week-to-week or month-to-month changes. One example of a predictable pattern to avoid: eyesJan01, eyesFeb02, eyesMar03, etc. If someone was lucky enough to discover your password long ago, you don\'t want him to be able to predict what it will be in the future.\r\n\r\n\r\n\r\n\r\nPeter H. Gregory, CISSP, CISA, is an information technology and security consultant, a freelance writer and an author of several books, including Solaris Security, Enterprise Information Security, and CISSP for Dummies. As a consultant he provides strategic technology and security services to small and large businesses.\r\n\r\nHe can be reached at p.gregory@hartgregorygroup.com.\r\nHis Web site is www.hartgregorygroup.com. \r\n--------------------------------------------------------------------------------\r\n\r\nStore passwords in Counterpane Labs\' Password Safe tool. All passwords are encrypted with the robust Blowfish algorithm. A nifty feature of Password Safe is that when you double-click on a previously stored password entry, it silently copies it to the clipboard so you can paste in the password even if others are watching you type.\r\n\r\nCheck the quality of your password at SecurityStats.com. This Web site performs calculations based on the complexity and \"guessability\" of your password and tells you how good your password is. Remember that your password is transmitted over the Internet in the clear, so you should try similar passwords instead of your actual passwords to get an idea of the characteristics of a good one.\r\n\r\nAdopt ISO17799 password quality guidelines. Ask the IT department to implement best practices for password management in accordance with ISO17799, a widely recognized information security standard. According to the standard, here are some guidelines for passwords: \r\n\r\nThey should be at least six characters long. \r\nThey should be free of consecutive identical characters. \r\nDon\'t use all numbers or all letters. \r\nAvoid reusing or recycling old passwords. \r\nRequire that passwords be changed at regular intervals. \r\nForce users to change temporary passwords at the next log-on. \r\nMaintain a record of previous user passwords and prevent their reuse. \r\nChange all vendor default passwords. \r\nEliminate or lock shared-user accounts. \r\nWarning: Don\'t use any of the password examples that appear in this article! \r\nA note about password length: Some information security (infosec) professionals will bristle at ISO17799\'s recommendation for a mere six characters in a password. Some have told me that six characters are insufficient, based on the time it takes to crack a password. My response is this: Typically, hackers don\'t care about the length of passwords when choosing to crack open a computer account.\r\n\r\nOrganizations are rife with guest accounts, group accounts, accounts with no passwords, a lack of password expirations, passwords that can be easily guessed and opportunities to exploit technical weaknesses or perform social engineering. With all of these easy opportunities, computer accounts with good six-character passwords are only a trifle weaker than those with eight-character passwords. My point is that infosec professionals need to focus more on the compliance of good user-account hygiene than on the length of passwords. |
|