* via http://theMezz.com/lists

* subscribe at http://techPolice.com



 Predictable Passwords Simplify a Hacker's Task
Jennifer 8. Lee New York Times Service
Monday, December 31, 2001



Computer passwords are supposed to be personal, disposable and discreet. But people 
become sentimentally attached to them or leave them taped underneath their keyboards 
or on their monitors, to the dismay of computer-security professionals worldwide.

Even those who are vigilant about guarding passwords may be giving away more than they 
think. The problem is that computer passwords have evolved into the personality test 
of a networked society, as millions of people try to sum up their essence through a 
few taps on the keyboard. As psychologists know, people and personalities are often 
very predictable in the aggregate, and thus so are passwords - a reality that 
malevolent computer hackers often take advantage of.

"When you are thinking of something neutral to use as a password, whatever your 
obsession is will pop into your head," said Helen Petrie, a professor of human 
computer interaction at City University in London. "It's the new version of the 
inkblot or word-association test."

Psychologists say that people can store only five to nine random bits of information 
in their short-term memory. Users therefore often choose passwords with a personal 
meaning that they can associate with something in their long-term memory. A recent 
survey of 1,200 employees of British companies by CentralNic, a London-based 
domain-registration company, showed that half of them used passwords related to family 
- passwords based on names, nicknames or birthdays of partners, children or pets.

"God," "sex" and "money" are among the most popular passwords for those unschooled in 
computer security. At Bargaindog.com, a shopping site with more than 20 million users 
that is popular with middle-aged women, the leading password was "love."

Younger users tend to use self-laudatory terms. At a popular Web site that had 2.5 
million registered users with an average age of 25, popular passwords were "stud," 
"goddess," "cutiepie" and "hotbod."

"There were so many 'studs,' it wasn't even funny," said Andrew Prihodko, a former 
technologist for the site, which he requested not be identified. He said that male 
users tend to use words related to masculinity or profanity. The CentralNic survey 
found that about 10 percent of users fall into this category, which it calls 
"fantasist."

"Even though passwords are supposed to be absolutely secret, it's almost as if people 
are trying to show off with their passwords," said Ms. Petrie of City University.

Spy or security-related terms like "secret" and "password" are quite popular as well.

Even though the soaring number of Web sites, computer applications and financial 
services has increased demand for new passwords, most people tend to use the same ones 
over and over. A typical user might have to enter a password for 10 to 100 different 
uses, said Rachna Dhamija, a graduate student of information management and systems at 
the University of California at Berkeley who has researched passwords.

This tendency to reuse passwords could be easily exploited, said Mr. Prihodko, who is 
starting a security company called Cambridge Network Security.

As part of a security assessment for organizations, Mr. Prihodko designed a test in 
which employees are sent an e-mail message asking them to log on to a sweepstakes site 
with a password. People overwhelmingly picked passwords that they also used for more 
sensitive matters like corporate e-mail. The point, he said, is that companies should 
encourage their employees to keep their work passwords and personal passwords separate.

Even high-ranking executives may act on naive impulses when it comes to choosing a 
password. Edward Skoudis, vice president for security strategy at Predictive Systems 
in Manhattan, recounted how the user account of the top executive at a large Japanese 
financial institution was cracked open during a security assessment. The automatic 
password scanner found that his password was a woman's name.

Sometimes passwords can be cracked by security consultants with what is known as a 
"brute force" program, which may try every possible six- or seven-character 
combination. But given that what emerges from the human mind is seldom truly random, 
the more efficient computer programs systematically use extended dictionaries.

At a million password attempts per second, the password scanners used by security 
companies can be very efficient. In the typical corporation with 10,000 employees 
using Microsoft Windows, 20 percent to 50 percent of the Windows passwords could be 
determined in the first 20 minutes with an extended word-list attack, and 90 percent 
on the first day by adding a brute-force attack, said Chris Wysopal, director of 
research and development for @stake, a security company based in Cambridge, 
Massachusetts, that produces a Windows password-auditing tool called LC3.

Passwords, the "open sesame" of a computerized world, are thus the sieves of computer 
security. Passwords are also the only authentication of identity within a corporate 
network to which many people may have access.

"When insiders go bad and want to steal information, a password attack is a very 
common thing," Mr. Wysopal said.

Users often think that they have nothing in their accounts that a malicious hacker 
would want to see. But hackers often look at breaking into accounts as a means to an 
end. Ryo Furue, an assistant professor at the Center for Climate System Research at 
the University of Tokyo, said that a hacker used a password-dictionary cracker called 
Crack to run rampant through the university's systems after starting from a relatively 
innocuous account at the Educational Computer Center.

"A system is more fragile if you have an attacker inside it than if the attack is from 
outside," Mr. Furue said.

Some organizations devote time to creating elaborate password policies - the Defense 
Department's guidelines are 30 pages long. Some employers require that passwords be 
frequently changed or that they include a combination of letters, numbers and special 
characters.

But such stringent regulations often backfire. Faced with remembering complex new 
passwords, some people change them back to what they were, write them down although 
others might find them - or simply forget them.

A systems administrator at a company that made employees change passwords every two 
weeks found that about 80 percent of the time, users either taped their passwords 
underneath their keyboards or used a variation on the date on which they were last 
required to change passwords.

Since passwords are meant to be private, learning someone's password can open a window 
into someone's thoughts. "When it's an opposite-sex name that is not a spouse or their 
kids, you always wonder if you've learned a little secret," Mr. Wysopal said.

At HipGuide, a New York multimedia company, employees must turn in their passwords 
when they leave. Syl Tang, the chief executive, said she was surprised by the 
passwords of a departing employee who seemed very conservative. The employee's 
passwords were all obscenities.

"It is sort of odd," Ms. Tang said. "You wonder what is going on beneath the surface."


http://www.iht.com/articles/43366.html

============================================================
Join Dialfreecalls.com TODAY and make all your phone calls
worldwide for FREE!! No Fees of any kind! Call from Any
Phone! No purchases and No credit cards required. Join Now.
It's Simple, Easy, and Best of All, it's FREE!
http://click.topica.com/caaafizb1dhr0b2EDp2f/Dialfreecalls.com
============================================================

--via http://techPolice.com
archive: http://theMezz.com/cybercrime/archive
subscribe: [EMAIL PROTECTED]
--via http://theMezz.com

==^================================================================
This email was sent to: archive@jab.org

EASY UNSUBSCRIBE click here: http://topica.com/u/?b1dhr0.b2EDp2
Or send an email to: [EMAIL PROTECTED]

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================

Reply via email to