Learning Library

← Back to Library

Beyond Passwords: Secure Authentication Solutions

Key Points

  • Passwords are fundamentally weak because users choose simple, easily guessable strings, reuse them across sites, and inevitably forget even the stronger ones they create.
  • This reuse creates a “single point of failure” where compromising one account gives attackers access to all of a user’s other services.
  • Password managers can generate and store unique, strong passwords for each site, reducing the memory burden, but they still rely on a master password and are vulnerable to phishing and breaches of the manager itself.
  • Because any system that stores passwords can be targeted, many experts advocate moving away from passwords altogether in favor of more secure, convenient authentication methods.

Full Transcript

# Beyond Passwords: Secure Authentication Solutions **Source:** [https://www.youtube.com/watch?v=f6LD9sDKQq8](https://www.youtube.com/watch?v=f6LD9sDKQq8) **Duration:** 00:11:31 ## Summary - Passwords are fundamentally weak because users choose simple, easily guessable strings, reuse them across sites, and inevitably forget even the stronger ones they create. - This reuse creates a “single point of failure” where compromising one account gives attackers access to all of a user’s other services. - Password managers can generate and store unique, strong passwords for each site, reducing the memory burden, but they still rely on a master password and are vulnerable to phishing and breaches of the manager itself. - Because any system that stores passwords can be targeted, many experts advocate moving away from passwords altogether in favor of more secure, convenient authentication methods. ## Sections - [00:00:00](https://www.youtube.com/watch?v=f6LD9sDKQq8&t=0s) **Untitled Section** - ## Full Transcript
0:04hold on I'm entering my 0:06password you won't tell anybody right 0:10this is what a password looks like for a 0:11security guy and we'll just let it 0:14autocomplete if only it could do that in 0:15the real world well a really good 0:18password looks like this you can 0:21remember that right piece of cake well 0:24maybe not um what would be better than a 0:28really good complex secure password I'll 0:32tell you this no password would you like 0:35that yeah let's get rid of the password 0:37entirely but let's not compromise on 0:40security is there a way to do that where 0:42you can have security and convenience at 0:45the same time sounds kind of crazy but 0:47let's take a 0:48look okay so what's the problem with 0:51passwords well it turns out this is the 0:55face of the enemy when it comes to 0:57passwords it's people because if to 1:00their own devices this is what people 1:02are going to choose as their passwords 1:04we know this because we can look and see 1:06at when there have been password 1:07breaches and look at what those 1:09passwords were that were most frequently 1:11chosen here's a favorite of mine yeah 1:14people really choose that as their 1:15password so people pick bad passwords 1:19then they can't even remember their bad 1:22passwords that they selected especially 1:24if they were good enough to pick a good 1:26password that's even harder to remember 1:29and then what do they do they put that 1:31same password on every single system 1:34that they use so that if one of these 1:36systems Falls then they all fall and all 1:39an attacker has to do is figure out how 1:41to get into one and then they can get 1:43into everything into that person's life 1:46so one of the options then that people 1:48have looked at and it's a solid option 1:50if you have to use a password is a 1:52password manager let's take a look at 1:55how that works so here we've got a user 1:58and they're going to log into a piece of 2:00software we'll call a password manager 2:02and it's going to store strong unique 2:04passwords for every single system that 2:07they need to log into so there's a whole 2:08bunch of these back here it keeps a 2:11unique password for each one the user 2:13does not have to remember that they just 2:15have to know how to log into the 2:16password manager and then the rest of 2:18it's handled for them beautiful until 2:22you consider the fact that we still have 2:25these guys out here the bad guys and 2:28what if this guy sends an email to this 2:31person a fishing email that convinces 2:33them to then click on the fishing 2:36website which is a bad website and it 2:39looks like a legitimate website they try 2:41to log in they enter their password and 2:44even if the password came from the 2:45password manager even if it was really 2:47secure this guy has now got your 2:50credentials that's one problem another 2:52problem what if this guy figures out how 2:54to break into one of these systems any 2:57of them the the password that you have 2:59is stored in probably a hashed form at 3:02least we hope it's been encrypted with a 3:04one-way hash if not it's even worse if 3:07they have that and they're able to then 3:09later brute force and break that 3:10password well then this guy still wins 3:14so the fact that a password exists is 3:17already a problem in the first place 3:19because that password has to exist in 3:21lots of different places potentially 3:23here as well so that's the problem space 3:26again passwordless if we can get rid of 3:29the things entirely without compromising 3:31security would be a better option let's 3:33take a look at how we could do that so 3:37authentication that is answering the 3:39question who are you is based upon three 3:42different things it's based upon 3:44something you 3:45know something you have or something you 3:50are something you know would be a 3:52password or pen something you have a 3:54particular device for instance that you 3:55carry around with you something you are 3:57would be a biometric a measurement of 4:00your physical characteristics and 4:02multiactor authentication or 4:04MFA is where we basically combine 4:08multiples of these sometimes all three 4:10sometimes just two and combine these 4:13into a soup that then gives us higher 4:17confidence that you are who you claim to 4:19be okay let's take a look at what some 4:21of the alternatives are and what we 4:23could use these for and where their 4:26strengths and weaknesses are now I'm 4:28going to tell you this is going to be a 4:29little controversal iial some of you are 4:30going to disagree with the way I 4:31characterize these there are a lot of 4:33variables so I'm having to generalize so 4:36give me a little space on this but this 4:37is in general what I think about this 4:40one possibility is to use get rid of 4:42passwords and use a hardware token a 4:44device a separate device that you carry 4:46around with you some of the early 4:47versions of these had an LCD display 4:49with a six-digit number that changed 4:51every 60 seconds or so and and you had 4:54to keep that with you well from a cost 4:56perspective not so good because you're 4:58adding an additional device and that div 5:01additional device gets lost or stolen 5:04breaks uh has to be replaced and so 5:07people were famous for losing these 5:08things all the time from a convenience 5:11standpoint definitely not convenient 5:13because now that's another thing I got 5:14to keep up with how about from a 5:17security standpoint well security-wise 5:19it was actually pretty good and you 5:21could use this in combination as I 5:23mention with multifactors but a lot of 5:26times you might just use this by itself 5:28and if you used it just by itself it 5:30still might be more secure You could 5:32argue than just a basic user chosen 5:35password because people choose bad 5:37passwords now how about another option 5:39uh a one-time password a one-time thing 5:43that is only used for a specific period 5:45of time and then it times out a classic 5:48example this you see these all the time 5:49you go to login and then it sends you a 5:51text message with a six-digit code and 5:54so that um you know the cost of that is 5:57not bad you know we can generate SMS 6:00messages pretty easily sometimes we do 6:01them in emails sometimes even an app 6:04will pop up and do it but we'll take a 6:06look at this example however from a just 6:09general convenience standpoint well it 6:11may or may not be very convenient that's 6:13going to kind of depend on how the 6:15particular implementation is done some 6:17of the devices now are smart enough to 6:18be able to read that automatically for 6:20you and stuff it in on the field for you 6:22in that case the convenience is not bad 6:24you just have to wait a little while but 6:26otherwise if you're having to type that 6:28in it's not so convenient to do 6:29something like that how about from a 6:32security standpoint I'd say this is 6:33pretty good it's definitely Improvement 6:36because it's having to in fact prove 6:38that you have something in fact we could 6:40take a look back at these different 6:42Alternatives and say this is based upon 6:44something you have this is also based 6:47upon something that you have um and and 6:50so we're using these in addition maybe 6:53to a password or in place of a password 6:56uh then using a push notification to an 6:59app is another application another 7:01possibility you have an app already 7:03installed on your phone you 7:04pre-registered the phone and when you go 7:06to log in it pops up a message on your 7:08phone and you look at that and then you 7:10basically unlock your phone with a pin 7:12that you have chosen well okay how do we 7:15think about this well the cost is not 7:17bad most people have a a phone with them 7:19already a mobile phone so we're not 7:21having to deploy new devices that have 7:23to be dealt with in that way um that 7:26from a convenience standpoint again 7:28pretty convenient because if if you're 7:29like me your phone is rarely more than 7:32uh arms length away from you most of the 7:34time anyway so it's already there it's 7:36not an additional device that you're 7:37having to carry and then from a security 7:40standpoint yeah I think it's better than 7:43just a a a self-chosen password because 7:45again people are really pretty bad at 7:47choosing passwords and in this case now 7:50we're combining so something you have 7:53the pre-registered phone combined with 7:56something that you know a particular pen 7:59so you you use that then to uh to do 8:02multiactor form and again no real 8:04password although you could argue this 8:06is a little bit like a password how 8:08about a different form of this about a 8:10push notification with a biometric so 8:13the push notification pops up on your 8:15phone then you either look at the phone 8:16and use a facial recognition or 8:18fingerprint re recognition or some form 8:20of biometric so now we're combining 8:23something you have along with something 8:25you are and this how does this stack up 8:28well again the cost is pretty low 8:30because we can usually do this from your 8:32mobile phone and most people have one of 8:33those convenience you've already got 8:35this sitting around with you I would 8:37argue this gets actually more secure 8:39than some of the other things because 8:40it's going to be harder to replicate 8:42assuming that the biometric reader is 8:44good it's going to be harder to 8:46replicate your face or your fingerprint 8:48than it would be a six-digit pen so that 8:51information could exist in multiple 8:53places for instance and then finally the 8:56one that I think is the best of these 8:58alternatives uh would be Pho which is 9:01the fast identity online standard I did 9:03a video on this earlier so actually two 9:05videos so go take a look at those if you 9:07want to know more about how this works 9:09but it's a cryptographic uses pki uh 9:13along with a biometric for you to unlock 9:15the cryptographic keys and then those 9:17are exchanged and the beautiful thing 9:19about this is there's no password stored 9:21on the server there's no password to 9:23steal therefore no password to fish so 9:26it has it deals with a lot of the issues 9:29that we saw with some of the previous 9:31options that deal with passwords and you 9:33don't have to remember anything in most 9:36cases you just look at your phone and 9:37unlock it and you're done so that's 9:40something you have a pre-registered 9:42device plus something you are multiactor 9:45cryptographically strong how does this 9:47show up on the score sheet well I'm 9:49going to say it's cost pretty similar to 9:52all these others in fact passwords by 9:54the way are not free because the number 9:55one call to most help desk is reset my 9:58password and those calls are anywhere 10:00from $ 20 to $50 a call so most 10:02organizations are spending a lot on 10:04passwords and just don't really realize 10:05it then from a convenience standpoint 10:09again doesn't get much easier than a a 10:11push notification pops up I look at my 10:14phone I unlock the phone that's it from 10:16a security standpoint I'll argue this is 10:19the one that is the most secure because 10:21we're leveraging a lot of different 10:23things here it's multiactor 10:25authentication it's using a biometric 10:27it's getting rid of a password there 10:29therefore a password can't be stolen 10:30because it never existed in the first 10:32place so lots of possibilities here and 10:35by the way if you want to you can sync 10:37those keys across multiple devices to 10:38make it simpler as 10:40well okay now we've taken a look at some 10:43of the more popular options to replacing 10:46passwords in some cases they're used 10:47along with passwords to strengthen but 10:50they could be viable alternatives to get 10:52rid of passwords and take those nasty 10:53things out of your life all together 10:57basically we in security are always 10:59trying to balance the tradeoffs between 11:02high security and high convenience users 11:05love this uh and security people love 11:08this anytime we get a chance to optimize 11:11on both of those that's a win for both 11:14sides then it's like we can have our 11:16cake and eat it too and I do love cake 11:20if you like this video and want to see 11:22more like it please like And subscribe 11:24if you have any questions or want to 11:26share your thoughts about this topic 11:28please leave a comment below