Week 17: Are passwords safe, and what are the alternatives?
Passwords aren’t contemporary. In fact, their implementation dates back to ancient Rome. In the 6th book of Histories, the Greek historian Polybius, who lived between 261 and 146 BC, mentions the term “Watchword”, which refers to a secret used by the Roman armies, inscribed on a wooden tablet and passed around to distinguish between friends and enemies. Fast forward to 1961, Dr. Fernando Corbato used the first digital password to protect user accounts. And in 1962, a PhD student, Allan Scherr, committed the first password theft.
Since then, bad actors have only upped their game. Remember Week 7, when we looked at social engineering and phishing? Well, that was just one type of attack. Cyber Threat Actors (CTAs) can choose to employ any of the following:
Fortunately, not all is gloom and doom. There are a few steps you can take, as a user, to protect yourself:
(Note: There is a debate that suggests password rotation can lead to poor hygiene because users tend to use predictable secrets).
As a business, you could consider the following best practices:
Let’s ignore for a moment the different techniques by which passwords can be compromised and focus on the financial impact. In a 2019 study, Yubico concluded that organizations spent an average of $5.2M to set and reset passwords. That same study suggested employees spend about 11 hours per year to regenerate their passwords. According to Gartner, 40% of the calls received by IT revolve around passwords. Finally, research conducted by Forrester states that every password-related call costs a business approximately $70. If you now start calculating the number of employees plus the number of times IT receives a call plus the cost of each of those calls… The cost of using passwords is astronomical.
So, it shouldn’t be a surprise that the big tech giants are pushing for the adoption of passwordless authentication (i.e., password ditching). These include biometrics and possession factors such as an authenticator app or push notifications. Some businesses have even started using magic links. The benefits of a passwordless approach can range from enhanced security and reduction of IT overheads to increased user experience and compliance (due to reduced exposure of sensitive information and the fact that the business no longer has the onus of protecting passwords).
If you’re looking for higher assurance, it’s recommended that you use FIDO-certified products like Windows Hello, FIDO2 Security Keys (for example, Titan), or Passkeys. The FIDO Alliance is formed of over 250 members such as Apple, Microsoft, Amazon, Facebook, and Visa, who joined forces to develop a common authentication standard that operates on public key cryptography.
Recommended by LinkedIn
Let’s take passkeys, for example. When you want to log in to Google, for example, you authenticate using your fingerprint. Your fingerprint unlocks the private key to solve a challenge (or, in layman’s terms, sign a request). The response is sent to Google, which verifies it using your public key.
(Note: Neither your private key nor your biometric leave the device).
But wait. What happens if a bad actor has physical possession of your phone and wants to steal the passkey? Well, first he/ she would have to unlock your device using your biometric information. Second, your private key is usually stored on a hardware component known as a Trusted Platform Module (TPM), which is considered virtually impenetrable. You can log in to the desired service using an OTP, for example, and revoke that key pair.
We thought we’d end this week with some humor around passwords, so please enjoy this video.
Next week, we’ll introduce risk management.
This article is part of a project called Security Chronicles, written jointly with Walter Buyu .
Sources: