小程序
传感搜
传感圈

Passwords Aren’t Going Anywhere… Except into Hackers’ Hands

2022-08-31
关注

Illustration: © IoT For All

Verizon’s recent Data Breach Investigations Report underscores that stolen credentials remain one of hackers’ most preferred means of entry, with their usage involved in over 80 percent of web application attacks. Many in the security community are seizing on these findings to proclaim them a case for the “passwordless” movement, but nothing could be further from the truth. 

While passwordless authentication solutions can sometimes be used to grant access to IoT devices and connected systems, it would be foolish to assume that the days of relying on passwords for authentication are in the rearview mirror. 

'While passwordless authentication solutions can sometimes be used to grant access to IoT devices and connected systems, the days of relying on passwords for authentication are not over.' -Michael GreeneClick To Tweet

Passwordless Solutions Still Rely on Passwords as a Fallback

If you have an Apple device, there’s a good chance you’ve encountered a problem with Touch ID at some point. There are various reasons why Touch ID authentication might fail—debris on the button, users’ finger positioning, or issues with system configuration, for example. When this happens, the system defaults to asking for a password and the same is true for connected technologies protected by biometrics. 

When viewed from this perspective, the security of these accounts is really only as good as the password. Given the rampant problem of password reuse, there’s a strong likelihood that the credentials deployed as a backup means of authentication have already been exposed and are available to hackers on the Dark Web. Due to the current maturity of biometric technology, a fallback means of authentication will be required for the foreseeable future. And when you consider that this secondary form of log-in is generally a password, the notion of passwordless loses some of its shine. 

Credentials are Required to Authenticate the System on the Back End 

Another issue preventing the promise of passwordless from being realized is that credentials are still generally required to authenticate the system at some point in the security chain. For example, if you gain access to the office via a hardware token, the system will default to your unique access code when the token is damaged or misplaced. However, the IT admin who logs into the system to analyze the data will use credentials, meaning that passwords are still involved to authenticate the system.

Additional Challenges with Alternative Authentication Mechanisms 

The above examples highlight that going truly passwordless is not likely in the near term. However, biometrics and other invisible security strategies also have some additional authentication concerns. For example: 

  • Device/Service Limitations: IoT developers can include biometric scanners on connected devices, but a large portion of the population still utilizes older laptops and phones that don’t support the technology. 
  • User Issues: There have also been documented issues during large-scale biometric implementations in which some users have been unable to authenticate themselves via a particular attribute. Until the technology matures sufficiently to address this incompatibility, these people will need system access via more traditional avenues. 
  • Spoofing Concerns: It’s impossible to update your fingerprint or retina, but the same can’t be said for hackers’ attempts to copy these or other physical attributes. Particularly as deep-fake technology becomes more widespread, it will be even easier for threat actors to capture and reuse people’s biometric identifiers. 

Securing Password Security Through the Password Layer 

In light of these factors, companies should focus on securing the password layer before considering any passwordless solution. While the Verizon report correctly identified that hackers are eager to exploit credentials as a threat vector, with the right approach, organizations can essentially eliminate this vulnerability. 

The most effective strategy is to adopt a hybrid approach to authentication where passwordless is introduced to reduce user friction and increase security, while still diligently pursuing techniques and practices that strengthen the passwords for optimal password security. As our reliance on IoT technology continues to grow, password-driven authentication will remain a cornerstone of authentication strategies for the foreseeable future.

Tweet

Share

Share

Email

  • Cybersecurity
  • Device Management
  • IT and Security
  • Privacy

  • Cybersecurity
  • Device Management
  • IT and Security
  • Privacy

参考译文
除了落入黑客之手,密码无处可去
Verizon最近的数据泄露调查报告强调,窃取的证书仍然是黑客最喜欢的入侵手段之一,超过80%的网络应用程序攻击都使用了窃取的证书。安全领域的许多人抓住这些发现,宣称它们是“无密码”运动的理由,但事实远非如此。虽然无密码认证解决方案有时可以用于授予物联网设备和连接系统的访问权,但如果认为依赖密码进行认证的日子已经过去,那就太愚蠢了。如果你用的是苹果设备,你很有可能在某个时候遇到过Touch ID的问题。导致Touch ID认证失败的原因有很多——例如,按钮上的碎片、用户的手指位置或系统配置问题。当这种情况发生时,系统默认要求输入密码,受生物识别技术保护的互联技术也是如此。从这个角度来看,这些帐户的安全性实际上就像密码一样好。考虑到密码重复使用的问题十分严重,作为身份验证备份手段的凭证很可能已经被暴露,黑网上的黑客可以使用它们。由于目前生物识别技术的成熟,在可预见的未来,将需要一种后备的认证手段。当您考虑到登录的第二种形式通常是密码时,无密码的概念就失去了一些光芒。防止实现无密码承诺的另一个问题是,在安全链的某个点上,通常仍然需要凭据来验证系统。例如,如果您通过硬件令牌获得访问办公室的权限,当令牌损坏或错位时,系统将默认为您唯一的访问代码。但是,登录到系统分析数据的IT管理员将使用凭据,这意味着在验证系统时仍然需要使用密码。上述例子强调,在近期内不太可能实现真正的无密码。然而,生物识别和其他隐形安全策略也有一些额外的身份验证问题。例如:考虑到这些因素,公司在考虑任何无密码解决方案之前,应该把重点放在保护密码层上。虽然Verizon的报告正确地指出,黑客渴望利用证书作为威胁载体,但通过正确的方法,组织可以从根本上消除这一漏洞。最有效的策略是采用一种混合的身份验证方法,其中引入了无密码,以减少用户摩擦并提高安全性,同时仍然努力追求加强密码的技术和实践,以实现最佳的密码安全性。随着我们对物联网技术的依赖不断增长,在可预见的未来,密码驱动认证仍将是认证策略的基石。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘