Passwords Aren’t Going Anywhere… Except into Hackers’ Hands

2022-08-31
关注

Illustration: © IoT For All

Verizon’s recent Data Breach Investigations Report underscores that stolen credentials remain one of hackers’ most preferred means of entry, with their usage involved in over 80 percent of web application attacks. Many in the security community are seizing on these findings to proclaim them a case for the “passwordless” movement, but nothing could be further from the truth. 

While passwordless authentication solutions can sometimes be used to grant access to IoT devices and connected systems, it would be foolish to assume that the days of relying on passwords for authentication are in the rearview mirror. 

'While passwordless authentication solutions can sometimes be used to grant access to IoT devices and connected systems, the days of relying on passwords for authentication are not over.' -Michael GreeneClick To Tweet

Passwordless Solutions Still Rely on Passwords as a Fallback

If you have an Apple device, there’s a good chance you’ve encountered a problem with Touch ID at some point. There are various reasons why Touch ID authentication might fail—debris on the button, users’ finger positioning, or issues with system configuration, for example. When this happens, the system defaults to asking for a password and the same is true for connected technologies protected by biometrics. 

When viewed from this perspective, the security of these accounts is really only as good as the password. Given the rampant problem of password reuse, there’s a strong likelihood that the credentials deployed as a backup means of authentication have already been exposed and are available to hackers on the Dark Web. Due to the current maturity of biometric technology, a fallback means of authentication will be required for the foreseeable future. And when you consider that this secondary form of log-in is generally a password, the notion of passwordless loses some of its shine. 

Credentials are Required to Authenticate the System on the Back End 

Another issue preventing the promise of passwordless from being realized is that credentials are still generally required to authenticate the system at some point in the security chain. For example, if you gain access to the office via a hardware token, the system will default to your unique access code when the token is damaged or misplaced. However, the IT admin who logs into the system to analyze the data will use credentials, meaning that passwords are still involved to authenticate the system.

Additional Challenges with Alternative Authentication Mechanisms 

The above examples highlight that going truly passwordless is not likely in the near term. However, biometrics and other invisible security strategies also have some additional authentication concerns. For example: 

  • Device/Service Limitations: IoT developers can include biometric scanners on connected devices, but a large portion of the population still utilizes older laptops and phones that don’t support the technology. 
  • User Issues: There have also been documented issues during large-scale biometric implementations in which some users have been unable to authenticate themselves via a particular attribute. Until the technology matures sufficiently to address this incompatibility, these people will need system access via more traditional avenues. 
  • Spoofing Concerns: It’s impossible to update your fingerprint or retina, but the same can’t be said for hackers’ attempts to copy these or other physical attributes. Particularly as deep-fake technology becomes more widespread, it will be even easier for threat actors to capture and reuse people’s biometric identifiers. 

Securing Password Security Through the Password Layer 

In light of these factors, companies should focus on securing the password layer before considering any passwordless solution. While the Verizon report correctly identified that hackers are eager to exploit credentials as a threat vector, with the right approach, organizations can essentially eliminate this vulnerability. 

The most effective strategy is to adopt a hybrid approach to authentication where passwordless is introduced to reduce user friction and increase security, while still diligently pursuing techniques and practices that strengthen the passwords for optimal password security. As our reliance on IoT technology continues to grow, password-driven authentication will remain a cornerstone of authentication strategies for the foreseeable future.

Tweet

Share

Share

Email

  • Cybersecurity
  • Device Management
  • IT and Security
  • Privacy

  • Cybersecurity
  • Device Management
  • IT and Security
  • Privacy

参考译文
除了落入黑客之手,密码无处可去
Verizon最近的数据泄露调查报告强调,窃取的证书仍然是黑客最喜欢的入侵手段之一,超过80%的网络应用程序攻击都使用了窃取的证书。安全领域的许多人抓住这些发现,宣称它们是“无密码”运动的理由,但事实远非如此。虽然无密码认证解决方案有时可以用于授予物联网设备和连接系统的访问权,但如果认为依赖密码进行认证的日子已经过去,那就太愚蠢了。如果你用的是苹果设备,你很有可能在某个时候遇到过Touch ID的问题。导致Touch ID认证失败的原因有很多——例如,按钮上的碎片、用户的手指位置或系统配置问题。当这种情况发生时,系统默认要求输入密码,受生物识别技术保护的互联技术也是如此。从这个角度来看,这些帐户的安全性实际上就像密码一样好。考虑到密码重复使用的问题十分严重,作为身份验证备份手段的凭证很可能已经被暴露,黑网上的黑客可以使用它们。由于目前生物识别技术的成熟,在可预见的未来,将需要一种后备的认证手段。当您考虑到登录的第二种形式通常是密码时,无密码的概念就失去了一些光芒。防止实现无密码承诺的另一个问题是,在安全链的某个点上,通常仍然需要凭据来验证系统。例如,如果您通过硬件令牌获得访问办公室的权限,当令牌损坏或错位时,系统将默认为您唯一的访问代码。但是,登录到系统分析数据的IT管理员将使用凭据,这意味着在验证系统时仍然需要使用密码。上述例子强调,在近期内不太可能实现真正的无密码。然而,生物识别和其他隐形安全策略也有一些额外的身份验证问题。例如:考虑到这些因素,公司在考虑任何无密码解决方案之前,应该把重点放在保护密码层上。虽然Verizon的报告正确地指出,黑客渴望利用证书作为威胁载体,但通过正确的方法,组织可以从根本上消除这一漏洞。最有效的策略是采用一种混合的身份验证方法,其中引入了无密码,以减少用户摩擦并提高安全性,同时仍然努力追求加强密码的技术和实践,以实现最佳的密码安全性。随着我们对物联网技术的依赖不断增长,在可预见的未来,密码驱动认证仍将是认证策略的基石。
  • en
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

TMP Pro Distribution C011EN RF 音频麦克风

C011型直通台式边界层话筒采用了非常坚固的外壳设计。它们自上而下由实心黄铜制成,确保在最极端环境下的可靠性。它们具有一个内置的幻影电源模块,该模块具有完全的射频保护,以防止在800兆赫-1.2兆赫频段工作的GSM设备的干扰。极性模式:全向频率响应:50赫兹-20千赫灵敏度:-42dB+\/-3dB@1千赫(0dB=1 V\/Pa)阻抗:200欧姆 S\/n比率:58dB最大SPL:120dB 1%THD电源要求:9-48伏幻像电源终端:外接3针XLR

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘