Network Security – Authentication

Authentication refers to the process of verifying the identity of a user. It ensures that the person or system accessing a particular resource or information is who they claim to be. Authentication typically involves the use of credentials, such as usernames and passwords, to validate the user’s identity. It helps prevent unauthorised access and protects sensitive data.

Characteristics of strong passwords

Strong passwords have certain characteristics that make them difficult to guess or crack. These characteristics include:

  1. Length: A strong password should be of sufficient length, for example, eight characters or more.
  2. Complexity: It should consist of a combination of uppercase and lowercase letters, numbers, and special characters.
  3. Uniqueness: Each password should be unique and not reused across multiple accounts.
  4. Randomness: Passwords should avoid predictable patterns or personal information that can be easily guessed.

The latest guidelines include password phrases where multiple words are used together.

Try haveibeenpwned.com to see if any of your accounts and passwords have been compromised.

Test if any of your passwords have been pwned in other hacks haveibeenpwned.com/Passwords

Organisational approach to password policies

Organisations implement password policies to ensure secure password practices among users. These policies establish rules regarding password creation, usage, and management. Common elements of an organisational approach to password policies may include:

  1. Regular password changes: Requiring employees to change their passwords periodically to minimize the risk of unauthorized access.
  2. Minimum password length and complexity requirements: Requiring a certain length and complexity level for passwords to enhance security.
  3. Restrictions on password reuse: Preventing the reuse of passwords across different accounts to avoid the risk of credential stuffing attacks.
  4. Lockout policies: Implementing measures to automatically lock user accounts after a certain number of failed login attempts, deterring unauthorised access attempts.

What problem could occur with regular password changes?

Test to see how hard it would be to brute-force a password security.org/how-secure-is-my-password

Password policies impact on data security

By enforcing strong password practices, they contribute to:

  1. Reduced risk of unauthorized access: Strong passwords make it more difficult for attackers to guess or crack them, thus protecting sensitive data from unauthorised individuals.
  2. Minimized password-based attacks: Regularly changing passwords and restricting reuse helps prevent brute-force attacks or credential stuffing that rely on compromised credentials. Brute-force attacks are where hackers (often using automation and bots) try multiple random passwords. Credential stuffing is where hackers use stolen credentials and try the usernames and passwords of the stolen credentials on multiple systems in case they’ve been reused.
  3. Enhanced overall security posture: By ensuring compliance with password policies, organisations establish a culture of security and awareness among employees, strengthening the overall security posture of the organization.

Why shouldn’t you use common passwords across multiple systems/websites?

Two-factor authentication

Two-factor authentication (2FA) is an additional layer of security that requires users to provide two forms of identification to access an account or system. It adds an extra step to the authentication process, making it more difficult for unauthorized individuals to gain access even if they possess the user’s password. Typically, 2FA combines something the user knows (such as a password) with something the user has (such as a temporary code sent to their mobile device or an authentication app). This combination provides a higher level of security compared to using passwords alone.

Biometrics

Biometrics refers to the measurement and analysis of unique physical characteristics for the purpose of authentication and identification. Biometric identifiers include fingerprints, facial recognition, iris patterns, and voiceprints. Biometric traits are difficult to forge or replicate. However, privacy concerns and the need to protect biometric data from unauthorized access or misuse should be taken into account when implementing biometric authentication systems.