Processor ® Free Subscription
Used HP, Used IBM, Used Compaq, Used Cisco, Used Sun
Home |  Register |  Contact Us   
This Week's Issue
Browse All Issues
Search All Articles
Product News & Information
News & Information
General Feature Articles

Six Quick Tips Email This
Print This
View My Personal Library

General Information Add To My Personal Library
July 2, 2010 • Vol.32 Issue 14
Page(s) 31 in print issue

Improving User Passwords
Create An Uncrackable Password To Keep Intruders Off Your System
Even though technology has changed by leaps and bounds since the dawn of the computer age, the humble password continues to endure as a cornerstone of computer system security. There are very few systems or applications today, if any, that don’t feature the use of passwords as a means to verify identity and provide protection from unauthorized access.

But, even though passwords are such a critical element of the computing security arsenal, the fact is many users unwittingly compromise their personal and work security by neglecting to practice sound password management techniques. Read on to learn more about effective techniques for improving user passwords and buttressing the security of critical business systems.

Make It Tough To Crack

This may seem hopelessly obvious, but it merits repeating: Users who choose strong, cryptic passwords are much less likely to have their security compromised than those who simply choose their first name followed by a couple of numbers (such as the year of their birth) or some other convenient and easy-to-remember character sequence. In fact, the best passwords feature long sequences of random characters.

With today’s computers, passwords that are eight characters or less are breakable by brute force in a few hours, says Slavik Markovich, chief technology officer at Sentrigo ( So, a strong password must feature at least eight random characters, preferably more. But, herein lies the nature of the eternal password conflict: How can users be expected to constantly memorize long strings of random characters?

Markovich recommends that users create passwords using phrases from favorite books. For example, the phrase “one ring to rule them all, one ring to find them” can be used to construct the password “oR2rta0r2ft.” The key is to use something that is familiar and understood to create something random and difficult to crack via a brute force attack.

Leverage Technology

An overwhelming aspect of password security for many users is the simple fact that nowadays, just about every application, Web site, or system a user needs access to requires some sort of password. Long gone are the days when enterprise users only had to remember three or four passwords; now, it is not at all uncommon to find even casual computer users juggling numerous passwords. Thankfully, there are a number of technologies that can ease the password burden for enterprise users.

An example of these technologies is SSO (single sign-on). With SSO, users are required to create and remember only one password that is then used to grant access to whatever systems they need access to. A key advantage to this approach, says Phara McLachlan, CEO of Animus Solutions (, is it limits the number of passwords users have to remember.

Another approach is via the use of password managers, says Owen Rubin, a private security specialist. These are applications that generate random secure passwords and then lock them in an encrypted file that is protected via a password set up by the user. Thus, users can generate as many strong passwords as needed yet only need to keep up with one password.

Other technological solutions include the use of single user repository stores—such as Active Directory—for password management and two-factor secure ID authentication, McLachlan says.

Establish Policies

James Litton, CEO of Identity Automation (, says administrators must require strong passwords and enforce their use throughout the organization using technology. Users, Litton says, must be educated to understand the fact that “strong” does not have to mean “hard.” Administrators should encourage users to use words that mean something to them—but not the names of family members or pets—and use a technique to replace certain letters with symbols or numbers so the user can more easily remember the password, he adds.

The key, Litton says, is to find a technique for generating passwords and stick to it. For example, a user may always capitalize the first or last letter of a word, or choose to always capitalize the vowels.

Litton also recommends that administrators encourage users to treat passwords like they treat their underwear: change them often and don’t leave them lying around. Even though there is plenty of debate over the effectiveness of requiring regular password changes, administrators must require that users regularly change passwords. This is effective because change will thwart the efforts of an intruder who has gained access to a compromised system, Litton says.

Deny The Defaults

Many applications automatically create accounts during their installation process, and in some cases provide default passwords, Markovich says. In their haste to quickly deploy a system, he adds, administrators will often accept these defaults, leaving the door wide open for anyone with experience installing these tools to gain access to a system using the default username/password combination.

So, policies should be in place that explicitly prohibit the use of these defaults during system installation, Markovich says. And, he adds, vulnerability scanners should be used to test the underlying databases of critical applications for default accounts.

Even then, critical applications may not be entirely safe. Even though some applications require that administrators define a minimum password length and require the use of numbers, special characters, or mixed cases, many do not. Markovich recommends that vulnerability assessments be run regularly for applications that are used to store sensitive data and don’t force the use of strong passwords, so weak passwords that are vulnerable to compromise using dictionary-based and brute-force techniques can be identified and corrected.

by Sixto Ortiz Jr.

Bonus Tips

Use encrypted password backups. Randy Abrams, director of technical education at ESET (, says users should back up their passwords using an encrypted file. There are applications in the marketplace, such as password managers, that provide this capability.

Don’t use personal information in passwords. Kevin Haley, director of Symantec Security Response (, says users should avoid personal information, repetition, sequences, and dictionary words when creating passwords. Using information like this will only make it easier for hackers to guess your password and gain access to your system.

Best Tip: Discourage Sharing

Sharing is a commendable quality, but not when it comes to access to critical enterprise systems. Even though most internal IT governance policies (and many regulatory standards) prohibit the use of common passwords for access to critical systems, there are always cases where this is done in enterprise environments, says Slavik Markovich, chief technology officer at Sentrigo ( Administrators should fix these when found, but only after ensuring that changing passwords won’t interrupt access, automated or otherwise, to key applications.

Easiest To Implement: Balance Policies With Password Strength

George Hess, CEO and co-founder of art of defence (, says strong passwords should contain upper- and lower-case letters, numbers, and non-alphanumeric characters (symbols such as “!”, “%”, etc.). However, policies requiring the creation and use of strong passwords should strike a balance, Hess says. Asking users to change passwords frequently will cause frustration and cause users to choose weak passwords or write them down. Strong password policies, if implemented carefully, prevent users from choosing weak passwords and causing user account security breaches.

Share This Article: Improving User Passwords     digg: Improving User Passwords     reddit: Improving User Passwords


Home     Copyright & Legal Notice     Privacy Policy     Site Map     Contact Us

Search results delivered by the Troika® system.

Copyright © by Sandhills Publishing Company 2014. All rights reserved.