Web-Books
im Austria-Forum
Austria-Forum
Web-Books
Informatik
The Future of Software Quality Assurance
Seite - 252 -
  • Benutzer
  • Version
    • Vollversion
    • Textversion
  • Sprache
    • Deutsch
    • English - Englisch

Seite - 252 - in The Future of Software Quality Assurance

Bild der Seite - 252 -

Bild der Seite - 252 - in The Future of Software Quality Assurance

Text der Seite - 252 -

252 K. Yorkston and $3.50 USD, with the potential for the purchaser to make up to 20 times the cost price.6 This is why we are continuously told not to replicate passwords over multiple sites. Account stuffing relies on a people-based weakness, we cannot rememberlong,complex,uniquepasswords, sowecheat!Andinadvertently,create avulnerability. 5 AboutPassword Security Passwords demonstrate the battle between security and usability. A long, complex password might be good for an organisation’s security, but if security procedures becomeonerous in theviewofusers, theywill findawayof subvertingoravoiding them. The procedure thus becomes ineffective. Consider the following password rules (whichmight lookfamiliar tomany)and thesubsequentpasswords: 1. Must bea minimum8 characters (12345678) 2. Must containat least 1upperand1 lowercase character (Qwertyui) 3. Must containat least 1number(Qwertyu1) 4. Must containat least 1 special character (Qwerty1!) 5. must bechangedevery30days (Qwerty2”) These listed passwords would take at most minutes to break for tools like John the Ripper or Hashcat. Various lists exist of the “Top 25” passwords used—all of whichvaryslightlyduetothedataonwhichtheydraw,butcontainmanyofthesame passwords (and yes, “password” is in there!) But they point to a common theme— that is when we think we are being “random”, we aren’t. There is a reason why “qwertyuiop” isn’t a good password—look at the top row of keys on a keyboard. Humansfollowpatterns,and thosepatternscanbepredictedand replicated. An interesting point is during the infamous Sony email hack relating to the release of the movie The Interview. The then CEO of Sony, Michael Lynton, had a password of Sonyml3.7 Any prizes for guessing what his next password might havebeen? We need to forget passwords. Any password of eight characters is broken very quickly,andjustbecausetheMINIMUMiseight, itdoesn’tmeanEXACTLYeight. Andeven if it cannotbebroken inseconds, the attackermaynotmind.Theywould have all the time they need to crack the password, as even when an alert goes out from the attacked site, how many people actually change THAT password, let alone all the other accounts using that same one. It should be noted that the encrypted password isn’t decrypted, but a known word is encrypted to see if the encryptedresult matchesany passwords in the stolen set. The longer the password, the exponentially more combinations could be used to create a password. And, it 6“The Economy of Credential Stuffing Attacks” listed on https://www.recordedfuture.com/ credential-stuffing-attacks/ 7https://twitter.com/kevinmitnick/status/545432732096946176?lang=en
zurĂĽck zum  Buch The Future of Software Quality Assurance"
The Future of Software Quality Assurance
Titel
The Future of Software Quality Assurance
Autor
Stephan Goericke
Verlag
Springer Nature Switzerland AG
Ort
Cham
Datum
2020
Sprache
englisch
Lizenz
CC BY 4.0
ISBN
978-3-030-29509-7
Abmessungen
15.5 x 24.1 cm
Seiten
276
Kategorie
Informatik
Web-Books
Bibliothek
Datenschutz
Impressum
Austria-Forum
Austria-Forum
Web-Books
The Future of Software Quality Assurance