Strong Passwords and Protocols

Rie Vainstein • June 15, 2024

Strong Passwords and Protocols

We are constantly being told to make sure our passwords are secure, and create a secure password. But oftentimes, the same sources don’t clearly explain how to do this and we are left puzzled and concerned about how to get it right.

 

In this blog we will attempt to draw together information from some of the most reliable sources and explain what they mean and how to create the best password for your needs.

 

The National Institute of Standards and Technology, or NIST, is a U.S. Government organization that is responsible for providing best practice guidance for federal agencies and programs. It is a leading advisory for security guidelines and is a good place to start. I will also draw from the federal Cybersecurity and Infrastructure Security Agency, or CISA, which is “the operational lead for federal cybersecurity”.

 

What is a Password?

 

For every online account, there needs to be a label or name associated with it – something to define to whom (or what) it is associated or belongs. We call this a “username”.

 

A password is the partner to your username. It validates that you are the correct user match for the account name. You can imagine that your account username is a door and your password is the key to unlock that door.

 

In the early days of the Internet, passwords could have been fairly simple: a 5-digit code may have sufficed. However, as the internet has grwon and cybercrime has increased so, too, has the need for more complex passwords to thwart the bad actors. Nowadays, we need stronger, more effective passwords.


Strong Password Creation

 

Rather than jumping ahead of ourselves, let’s start at the beginning: how do I create a strong password?

 

In the past, people used easy-to-remember passwords such as family member names, birthdays, anniversaries, pet names, hobbies, etc. The problem with these kinds of passwords is that they are easy to discover, especially since so many of us are intrinsically connected to social media. A quick search on any social media platform may reveal the names of family and friends, perhaps pet or hobby photos, and maybe even birth or anniversary dates. Further searches might show the organizations to which a person belongs and these may help identify work, school/university, or hobby connections. The wealth of personal data that is freely and easily available is quite disconcerting.

 

Then we were told to create passwords which were more complex. The problem with this was that people used a standard set of replacements: @ for a, & for b, © or ( for c, and so on. The same is true for numeric replacements with, for example, the number 3 replacing the letter e, 1 replacing the letter i, the number 5 replacing the letter s, etc. People tended to use the same logic, so they ended up keeping their original passwords, but just replaced some of the characters with either special characters or numeric substitutions: for example, the name “Debbie” might become D3&&13. The bad actors realized this and created computer programs that incorporated these standard substitutions. Then we were back at the proverbial "square one".

 

So, what to do now? People started adding special characters and extra numbers into these substituted words, which helped a bit: Debbie might become D_33*&&i^33. This is better and doesn’t make it quite as easy to crack, but it still isn’t good enough.


Passphrases

 

Then the idea of a “Passphrase” rather than a password was established. The difference between a passphrase and a password is that a passphrase consists of several straightforward dictionary words in a row, or “string”. It was said that for a bad actor to guess, or “crack”, a passphrase consisting simply of four words, could take in the region of 200 years at 1,000 guesses a second! (But this is highly dependent on the equipment and processing power that the attacker employs.)

 

The following is a graphic that was published on this subject...

 

This idea was challenged, but the challenges were then refuted, citing the passphrase idea as being valid. The idea of passphrases is still recommended today. (Now, while these four words appear to be secure, don’t be fooled into complacency. Because this cartoon is popular, threat actors will test for this passphrase, so this exact passphrase, or other combinations of these four words, should be avoided.)

 

Now that you know how to create a strong password – oops, apologies – how to create a strong passphrase, we can turn our attention to protocols.

 

Passphrase Protocols

 

There are a number of things you should and shouldn’t do when thinking about passphrases (and passwords). Here are some of them...

 

[1] Never use personal information (your name, family member names, birthdays, anniversaries, pet's names, etc.).

[2] Use a passphrase rather than a password.

[3] Use at least 12 characters, better still, use at least 14!

[4] Do not share your passphrases with anyone.

[5] Use a different passphrase for each account – don’t reuse the same one in different places.

[6] Don’t store your passphrases on your computer – use an online password manager.

 

Observing these practices will help to secure your environment.

 

Latest Recommendations

 

In order to add an extra layer of protection, advisors are currently recommending we establish Multi Factor Authentication, or MFA, otherwise known as Two-Factor Authentication, or 2FA. (The IT industry really loves its acronyms!) So, in addition to a key for our account “door” it is recommended that we provide a further item of evidence that we are who we say we are.

 

This can come in the form of a texted code or an answer to a security question that we enter into a web portal or, if physical access to a building is needed, perhaps a finger or palm print scan may be required.

 

MFA/2FA can include a combination of two different items from the following options...

[1] Something the user knows: this could be your passphrase.

[2] Something the user has: this could be your phone to receive the texted code.

[3] Something the user is: this might be a biometric, for physical access, such as a fingerprint scan.

 

Always, the idea is to stay ahead of the bad actors. As time progresses and more data breach information is available on the dark web, such as names, dates of birth, social security numbers, and even passwords you may have used in the past, we have to find further ways of securing our account access.

 

Securing your online presence is an ongoing process and must be treated with the perseverance that it demands. When we decide to take the shortcut for convenience, is when we expose ourselves to attack.

 

As is often wisely said by NC-Expert’s CTO, Phil Morgan, “Inconvenience is a hacker’s best friend!

 

Stay safe out there!

 

===

 

HELPFUL LINKS

 

NIST: https://www.nist.gov/cybersecurity

 

CISA: https://www.cisa.gov/

 

Length vs Complexity graphic: https://xkcd.com/936/

 

How We Can Help

To begin the process of training your employees in cybersecurity procedures as efficiently and cost-effectively as possible, NC-Expert provides you with a 1-day starter training session: CyberSAFE. ( https://www.nc-expert.com/class/certnexus-cybersafe )


In this training, your team will be taught the basics of cyber security, and will be made aware of the fundamental traps into which many employees fall, inadvertently allowing attackers access into your system.


Once this training has been completed, we can provide further trainings, which increase in complexity as your employees progress up the access permissions chain.


We can provide standard training classes or can customize a program to suit your specific needs and budget. Our trainings are delivered by expert instructors, for individual employees (in our public classes) or for private groups, virtually/online (in real time) or at your site. Contact us for details.


You are welcome to visit our website: https://www.nc-expert.com/


Or you can view our Security training portfolio here: https://www.nc-expert.com/training-classes-by-track#NetworkSecurity

...


About NC-Expert

 

NC-Expert is a privately-held California corporation and is well established within the Wireless and Cyber Security industry certification training, courseware development, and consulting markets. 

NC-Expert has won numerous private contracts with Fortune level companies around the world.  These customers depend on NC-Expert to train, advise, and mentor their staff. 

If you are looking for the best in IT industry training then call us at (855) 941-2121 or contact us by email today.

This post appeared first on NC Expert .

NC-Expert Blog

By Phil Morgan February 11, 2025
The Grim Realities of Transition Mode Summary of a recent experience relating to Transition Mode. I have been quite vocal of my hatred of Transition Mode (for WPA3). We have a solution for this - dual SSIDs: https://wifisecuritywizard.com/general/problems-with-wpa3/ IMHO - Transition Mode is dumb! Turn on WPA3, and for everything that doesn’t support it, create a second SSID for now... while you upgrade everything! I have actually said “it’s 2025 for goodness sake, how many devices do you have that don’t do WPA3?!” Well, the other day, the universe decided to mess with me... Scenario: in one of our smaller offices, we are upgrading to Ubiquiti. I arrive on site, I upgrade the system, 5GHz only WPA3, everything is working great! I do one last check, and one of the users mentions, “Oh, the Brother color laser printer isn’t working.” (It’s a nice little device. Prints really well. Cheap to run.)
By Phil Morgan January 24, 2025
This blog is a write up of what was discussed at our AMA webinar session. (Link provided inline.)
By Rie Vainstein January 18, 2025
An Important Task The IT industry is one of the most competitive and dynamic sectors in today’s swiftly evolving technology landscape. Whether you are a seasoned professional seeking to advance your career, or a newcomer seeking to enter into the field, obtaining IT certifications can have a substantial impact on your trajectory. However, earning certifications is not just about passing exams, an important factor is the study and practice that goes into getting ready to sit the exam. Training for IT industry certifications is a critical investment, offering both technical and professional benefits that can pay dividends throughout your career. Enhancing Technical Expertise At its core, IT certification training is designed to deepen your understanding of critical technologies and concepts. Whether it's network administration, design, cybersecurity, or analysis and optimization, each certification offers an opportunity to master a specialized area within the IT environment. By engaging in structured training programs, you not only learn the theoretical aspects of a technology but also gain hands-on experience in applying it to real-world scenarios. For example, pursuing certifications like CWNP’s Certified Wireless Network Administrator (CWNA), CompTIA’s Network+, or Cisco’s Certified Network Associate (CCNA) requires you to develop a solid foundation in network management, administration, and troubleshooting. This level of expertise is often beyond what you would learn on the job without formal training, giving you the ability to perform tasks more efficiently and with greater confidence.
Share by: