See inline

On Fri, Apr 16, 2010 at 11:02 AM, John Hornbuckle <
john.hornbuc...@taylor.k12.fl.us> wrote:

>  How do we mitigate the effect of passwords compromised as a result of
> social engineering? User training is certainly a factor, but let’s say the
> user still gives his/her password away to a bad guy. Would I rather the bad
> guy had access to the user’s data for 180 days, or 30 days?
>
> Education is the only way to mitigate the risk of a password compromised
via social engineering.  If someone can gain the password once, and the
password is changed periodically, there's nothing to prevent it from
happening again, unless the user is properly educated.  Furthermore, once
the bad guy has access to the information, you typically only need access
for the period of time to download the information, so the period of time as
relating to the password age becomes almost meaningless.  The attacker only
needs a period of time to download the data, and do with it what he pleases.

>  I’m not actually advocating a 30-day change interval—just pointing out
> that there are real security risks that password changes can mitigate.
>
>
>
In the scenario of a password being compromised, damage has already been
done, and the age of the changing of the password doesn't affect what's
already happened.  At best you've stopped information from being drained,
but that presumes that the attacker can't get back in with the same or other
methods he was able to deploy while he had access.  It all goes back to
education.  If the user had been educated maybe they wouldn't have respnded
to the social engineering attack, or at least thought it was suspicious
enough to report the attempt if they did respond.

>  BTW… I forwarded the article to our state auditor; a recent audit issued
> a finding against us for having a 90-day password expiration policy. She
> remained unmoved. Her office follows the GAO’s FISCAM, which recommends: 
> “Passwords
> are changed periodically, about every 30 to 90 days. The more sensitive the
> data or the function, the more frequently passwords should be changed.”
> Florida’s Auditor General goes with 60 days for network passwords. And
> personally, I don’t find 60 days to be egregious.
>
>
>
>
>
>
>
> John
>
>
>
>
>
>
>
> *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
> *Sent:* Friday, April 16, 2010 10:49 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: please don't change your password!
>
>
>
> Okay, let's look at it this way:
>
>
>
> Let's say that one environment has a 30 day password change policy, and
> another has a 90 day change policy?
>
>
>
> In terms of raw opportunity for brute force attacks, the latter environment
> has 2-3x the risk of attack as the former.   In terms of *practical*
> security differences, however, it is almost negligible.  Why?
>
>    - It doesn't take anywhere near 30 days to brute force passwords if you
>    had access to the hash
>    - Most attacks aren't going to try to brute force passwords remotely
>    because it is too obvious to notice in many cases
>    - You could spend far less time port scanning for vulnerable ports or
>    protocols
>    - You could spend far less time social engineering access to the
>    password
>    - You could spend far less time sending a well crafted email to take
>    advantage of a vulnerability or to spear phish the user
>
>
>
> So, other than the theoretical, there is very little difference in security
> between the two aforementioned environments if maximum password age is all
> that separates them.
>
>
>
> If someone intends to brute-force accounts in your domain, then even 7 days
> is too long of a password age.  Password length and complexity is vastly
> more important to overall security than is password age.
>
>
>
> I'd rather be in an environment with password changes every 120-180 days,
> and with passwords of 12+ characters, including special chars, than one with
> your typical 8 characters and changes every 30-45 days.
>
>
>
> The practicality of the former significantly outweighs the latter.
>
>
> -ASB: http://XeeSM.com/AndrewBaker <http://xeesm.com/AndrewBaker>
>
>
>   On Fri, Apr 16, 2010 at 10:27 AM, John Hornbuckle <
> john.hornbuc...@taylor.k12.fl.us> wrote:
>
> I agree that scripted attacks (which aren’t mitigated by password changes)
> dominate, and targeted attacks are less common. Nevertheless, the latter do
> occur. As for brute-force attacks… Cryptography isn’t my specialty, but I
> think you may be underestimating the time it takes to crack a complex
> password/passphrase.
>
>
>
> Changing passwords is a nominal task. It takes maybe 60 seconds to do. The
> real loss of productivity and introduction of new risk come from forgetting
> the new password or writing it down and storing it in an obvious
> location—both of which are behaviors that can easily be changed with a bit
> of training.
>
>
>
>
>
>
>
>
>
>
>
> John
>
>
>
>
>
>
>
>
>
>
>
> *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
> *Sent:* Friday, April 16, 2010 10:14 AM
>
>
> *To:* NT System Admin Issues
>
> *Subject:* Re: please don't change your password!
>
>
>
>  *This fails to consider the situation where a user’s password is
> compromised and the bad guy accesses the user’s information on an ongoing
> basis. For instance, monitoring a folder that contains files with
> information about patent filings to see when new  files show up, or logging
> into OWA to keep an eye on e-mail messages. The unauthorized access will end
> once the password is changed (assuming a variety of other factors, such as
> the bad guy not getting the new password, etc.), and thus requiring regular
> password changes can be of value.*
>
>
>
>
>
> We live in a world where scripted attacks dominate, and where targeted
> attacks are against highly privileged assets.
>
>
>
> Add to that, most scripted attacks are aimed at an application or OS or
> protocol vulnerability, with the primary intent of sending spam or rooting
> the machine in some way.
>
>
>
> Thus, the changing of passwords does little to mitigate any of the
> aforementioned.
>
>
>
> Even a targeted attack is likely to take steps to elevate privileges and
> creating a new account for the purpose of removing reliance on the
> compromised account.
>
>
>
>
>
>  *Similarly, regular password changes can mitigate the risk from
> brute-force attacks. If a password has to be changed every 60 days, for
> instance, the bad guy will only have 60 days to try to determine the user’s
> password. This is generally considered to be better than the bad guy having
> an infinite amount of time to try to determine it.*
>
>
>
>
>
> In most cases, it doesn't take weeks to brute force an account.  Mostly
> hours, and occasionally days.  (Doesn't everyone have a quad-core system
> or set of systems?)
>
>
>
> But that's not really the point.  Most breaches today aren't accomplished
> via brute force of the password.  There are hundreds of other approaches to
> get into systems remote that require far less time and effort, and all lead
> to elevated rights.
>
>
>
> -ASB: http://XeeSM.com/AndrewBaker <http://xeesm.com/AndrewBaker>
>
>
>
> On Fri, Apr 16, 2010 at 8:51 AM, John Hornbuckle <
> john.hornbuc...@taylor.k12.fl.us> wrote:
>
> There’s a flaw in the logic.
>
>
>
> The Globe article states:
>
>
>
> “ . . . [U]sers are admonished to change passwords regularly, but redoing
> them is not an effective preventive step against online infiltration unless
> the cyber attacker (or evil colleague) who steals your sign-in sequence
> waits to employ it until after you’ve switched to a new one, Herley wrote.
> That’s about as likely as a crook lifting a house key and then waiting until
> the lock is changed before sticking it in the door.”
>
>
>
> This fails to consider the situation where a user’s password is compromised
> and the bad guy accesses the user’s information on an ongoing basis. For
> instance, monitoring a folder that contains files with information about
> patent filings to see when new  files show up, or logging into OWA to keep
> an eye on e-mail messages. The unauthorized access will end once the
> password is changed (assuming a variety of other factors, such as the bad
> guy not getting the new password, etc.), and thus requiring regular password
> changes can be of value.
>
>
>
> Similarly, regular password changes can mitigate the risk from brute-force
> attacks. If a password has to be changed every 60 days, for instance, the
> bad guy will only have 60 days to try to determine the user’s password. This
> is generally considered to be better than the bad guy having an infinite
> amount of time to try to determine it.
>
>
>
>
>
>
>
> John Hornbuckle
>
> MIS Department
>
> Taylor County School District
>
> www.taylor.k12.fl.us
>
>
>
>
>
>
>
>
>
>
>
> *From:* Brian Clark [mailto:brianclark2...@googlemail.com]
> *Sent:* Thursday, April 15, 2010 4:38 PM
>
>
> *To:* NT System Admin Issues
>
> *Subject:* please don't change your password!
>
>
>
> After a long week doing a SBS migration I didn't know how to take this
> article and needed to share it!!
>
>
>
>
> http://www.boston.com/bostonglobe/ideas/articles/2010/04/11/please_do_not_change_your_password/?page=1
>
>
>
>
>
> Brian
>
>
>
>
>
>
>
>
>
>
>
>  NOTICE: Florida has a broad public records law. Most written communications 
> to or from this entity are public records that will be disclosed to the 
> public and the media upon request. E-mail communications may be subject to 
> public disclosure.
>
>
>
>
>
>
>
>
>
>
>
>   NOTICE: Florida has a broad public records law. Most written communications 
> to or from this entity are public records that will be disclosed to the 
> public and the media upon request. E-mail communications may be subject to 
> public disclosure.
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to