Passwords Aren’t Going Anywhere… Except into Hackers’ Hands

2022-08-31 10:20:58
关注

Illustration: © IoT For All

Verizon’s recent Data Breach Investigations Report underscores that stolen credentials remain one of hackers’ most preferred means of entry, with their usage involved in over 80 percent of web application attacks. Many in the security community are seizing on these findings to proclaim them a case for the “passwordless” movement, but nothing could be further from the truth. 

While passwordless authentication solutions can sometimes be used to grant access to IoT devices and connected systems, it would be foolish to assume that the days of relying on passwords for authentication are in the rearview mirror. 

'While passwordless authentication solutions can sometimes be used to grant access to IoT devices and connected systems, the days of relying on passwords for authentication are not over.' -Michael GreeneClick To Tweet

Passwordless Solutions Still Rely on Passwords as a Fallback

If you have an Apple device, there’s a good chance you’ve encountered a problem with Touch ID at some point. There are various reasons why Touch ID authentication might fail—debris on the button, users’ finger positioning, or issues with system configuration, for example. When this happens, the system defaults to asking for a password and the same is true for connected technologies protected by biometrics. 

When viewed from this perspective, the security of these accounts is really only as good as the password. Given the rampant problem of password reuse, there’s a strong likelihood that the credentials deployed as a backup means of authentication have already been exposed and are available to hackers on the Dark Web. Due to the current maturity of biometric technology, a fallback means of authentication will be required for the foreseeable future. And when you consider that this secondary form of log-in is generally a password, the notion of passwordless loses some of its shine. 

Credentials are Required to Authenticate the System on the Back End 

Another issue preventing the promise of passwordless from being realized is that credentials are still generally required to authenticate the system at some point in the security chain. For example, if you gain access to the office via a hardware token, the system will default to your unique access code when the token is damaged or misplaced. However, the IT admin who logs into the system to analyze the data will use credentials, meaning that passwords are still involved to authenticate the system.

Additional Challenges with Alternative Authentication Mechanisms 

The above examples highlight that going truly passwordless is not likely in the near term. However, biometrics and other invisible security strategies also have some additional authentication concerns. For example: 

  • Device/Service Limitations: IoT developers can include biometric scanners on connected devices, but a large portion of the population still utilizes older laptops and phones that don’t support the technology. 
  • User Issues: There have also been documented issues during large-scale biometric implementations in which some users have been unable to authenticate themselves via a particular attribute. Until the technology matures sufficiently to address this incompatibility, these people will need system access via more traditional avenues. 
  • Spoofing Concerns: It’s impossible to update your fingerprint or retina, but the same can’t be said for hackers’ attempts to copy these or other physical attributes. Particularly as deep-fake technology becomes more widespread, it will be even easier for threat actors to capture and reuse people’s biometric identifiers. 

Securing Password Security Through the Password Layer 

In light of these factors, companies should focus on securing the password layer before considering any passwordless solution. While the Verizon report correctly identified that hackers are eager to exploit credentials as a threat vector, with the right approach, organizations can essentially eliminate this vulnerability. 

The most effective strategy is to adopt a hybrid approach to authentication where passwordless is introduced to reduce user friction and increase security, while still diligently pursuing techniques and practices that strengthen the passwords for optimal password security. As our reliance on IoT technology continues to grow, password-driven authentication will remain a cornerstone of authentication strategies for the foreseeable future.

Tweet

Share

Share

Email

  • Cybersecurity
  • Device Management
  • IT and Security
  • Privacy

  • Cybersecurity
  • Device Management
  • IT and Security
  • Privacy

参考译文
除了落入黑客之手,密码无处可去
插图:© IoT For All --> Verizon 最近发布的数据泄露调查报告强调,被盗凭证仍然是黑客最偏爱的入侵方式之一,其中超过 80% 的网络应用攻击都涉及凭证的使用。许多安全领域的专家正借机宣扬“无密码”理念,但事实远非如此。尽管无密码认证方案有时可以用于访问物联网设备和连接系统,但据此认为我们已经可以完全摆脱密码进行身份验证,这未免太过轻率。 “尽管无密码认证方案有时可用于访问物联网设备和连接系统,但依靠密码进行身份验证的时代并未结束。”——Michael Greene 点击推文 无密码方案仍依赖密码作为备用方式 如果你使用的是苹果设备,那么很可能在某些时候遇到过 Touch ID 出现问题的情况。Touch ID 认证失败的原因有很多种,例如按钮上沾有灰尘、用户手指放置不当,或系统配置问题等。在这种情况下,系统通常会回退到要求输入密码,这一点同样适用于受生物识别保护的连接技术。从这个角度来看,这些账户的安全性实际上等同于密码的安全性。鉴于密码重复使用问题非常普遍,作为备用认证方式的凭证很可能已经被泄露,并在暗网中供黑客使用。由于目前生物识别技术尚不成熟,未来一段时间内仍需要备用的认证方式。而考虑到这种备用登录方式通常还是密码,无密码的理念也就显得不那么闪耀了。系统后端仍需凭证进行认证 另一个阻碍无密码理念得以实现的问题是,在安全链条的某一点上,系统仍然普遍需要凭证进行认证。例如,如果你是通过硬件令牌进入办公室的,当令牌损坏或丢失时,系统将要求你输入独有的访问代码。然而,登录系统分析数据的 IT 管理员,使用的就是凭证,这意味着密码实际上仍然参与了系统认证过程。替代认证机制的其他挑战 上述例子表明,短期内真正实现无密码几乎是不可能的。不过,生物识别和其他隐形安全策略也存在一些额外的认证问题。例如:- **设备/服务限制**:IoT 开发者可以在连接设备上加入生物识别扫描器,但仍有大量用户使用不支持该技术的旧款笔记本电脑和手机。 - **用户问题**:在大规模部署生物识别系统时,也出现了部分用户无法通过特定生物特征进行认证的问题。除非技术足够成熟以解决这些兼容性问题,否则这些人仍需通过更传统的途径访问系统。 - **伪造风险**:你无法更改自己的指纹或虹膜,但黑客却可以不断尝试复制这些生理特征。特别是随着深度伪造技术的普及,威胁者将更容易捕获并重用用户的生物识别信息。通过密码层增强密码安全性 鉴于上述各种因素,企业应首先专注于增强密码层的安全性,再考虑任何无密码方案。尽管 Verizon 的报告确实指出,黑客热衷于利用凭证作为攻击向量,但采取正确的措施后,组织基本上可以消除这一漏洞。最有效的策略是采用混合式身份验证方法,即在减少用户操作负担并提高安全性的同时引入无密码方案,同时继续采用增强密码安全性的技术和实践,以实现最佳的密码安全。随着我们对物联网技术的依赖不断加深,基于密码的身份验证在未来一段时间内仍将是身份验证策略的重要基石。推文分享 邮件 网络安全 设备管理 IT 与安全 隐私 --> 网络安全 设备管理 IT 与安全 隐私
您觉得本篇内容如何
评分

相关产品

TC天诚 NB-700M NB物联网锁

NB-700M是江苏新巢天诚智能技术有限公司自主研制开发的一款针对B端场景化的人脸物联网锁,通过平台统一下发人脸、密码、IC卡(身份证)等数据来实现远程控制集中管理。开门记录、告警记录在保留人脸物联网锁锁端离线数据的同时实时传输到平台,提高使用过程的安全性和便利性。NB-700M是一款高安全性、高稳定性、高便捷性的人脸物联网锁,开放接口支持与第三方系统无缝对接。

评论

您需要登录才可以回复|注册

提交评论

广告

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

密码就快要彻底消失了 没有人怀念它

提取码
复制提取码
点击跳转至百度网盘