Page 40 - StudyBook.pdf
P. 40

24     Chapter 1 • General Security Concepts: Access Control, Authentication, and Auditing

             Username/Password


             Username and password combinations have been used for authenticating uses for
             many years. Most OSes have had some form of local authentication that could be
             used if the OS was designed to be used by multiple users.Windows, Netware,
             UNIX, and Linux have all had local authentication paths early in their develop-
             ment.Although this is the most common authentication method, it is not without
             its problems. From a security standpoint, it is important to understand that the first
             line of defense of a system is the creation and maintenance of a password policy
             that is enforced and workable.You need to both implement and enforce the policy
             to ensure that this rudimentary protection is in place in your network. Most OSes
             have methods of utilizing username/password policies.
                 Password policies that require a user-created password less than 6 characters
             long are regarded as low (or no) security level. Password policies that require
             between 8 and 13 characters are regarded as a medium security level. Policies
             requiring 14 or more characters are regarded as a high security level.These security
             levels are based on the difficulty of discovering the password through the use of
             dictionary and brute force attacks.Additionally, password policies should require
             that an acceptable password contain a combination of the following:

                  ■   Uppercase and lowercase alphabetic characters
                  ■   Numbers

                  ■   Special characters
                  ■   No dictionary words
                  ■   No portion of the username in the password

                  ■   No personal identifiers should be used including birthdays, social security
                      number, pet’s name, and so on

                 To achieve the medium security level, implement the use of 8 characters,
             including uppercase and lowercase, numbers, and special characters. For high secu-
             rity, implement the medium security settings, and enforce the previous settings plus
             no dictionary words and no use of the username in the password. Be aware that the
             higher the number of characters or letters in a password, the more chance exists
             that the user will record the password and leave it where it can be found. Most
             policies work at about the 8-character range, and require periodic changes of the
             password as well as the use of special characters or numbers.





          www.syngress.com
   35   36   37   38   39   40   41   42   43   44   45