- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Perfect Password: Selection, Protection, Authentication Paperback – Dec 11 2005
|New from||Used from|
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
"What is the key to coming up with a secure password? Length. Use 10 characters or more, says Mark Burnett, author of Perfect Passwords (Syngress, $26, amazon.com). "Best are passwords that consist of a few parts"-words, prefixes, spelled-out numbers. Good examples: bluebananas and skyisfalling. "They’re easy to remember, and when you’re prompted to switch your password, you can just swap out one chunk," he says. With this method, foursaltypeanuts becomes foursaltycashews."--Real Simple Magazine
Inside This Book(Learn More)
Most Helpful Customer Reviews on Amazon.com (beta)
The book is unique because the author bases many of his recommendations on research, not theory. He says that over the course of his consulting career he has collected somewhere between 3 and 4 million passwords. (This seems somewhat suspicious, but I suppose dropping the usernames would make that practice acceptable.) By performing statistical analysis on those millions of real passwords, the author knows exactly what makes a bad password.
Perfect Passwords does a good job dispelling common password policy myths. I was glad to hear him report that changing passwords once a month is a stupid idea. A weak password is not "protected" by a monthly change, since it can be broken in a matter of hours. Instead, use 15 or more characters in passwords, and change them less frequently (perhaps every 6 or 12 months, depending on sensitivity).
The author also rightfully criticizes "secret questions" and stand-alone biometrics. Both systems suffer an important flaw: "the answer to the question is usually a fact that will never change," like the make of your first car or your fingerprint. If secret questions must be used, add a three-digit code to the answer. With biometrics, always accompany them with a password.
I had no major problems with Perfect Passwords. I did think that 21 pages of words in Appendix B and 16 pages of numbers in Appendix C didn't serve any real purpose. I thought the hand-drawn figures seemed really weak in places (Figure 3.1 is a lawn sprinkler?). One mathematical note -- pp 43-44 discuss combinations vs permutations. With permutations, it's important to note whether a number can be selected repeatedly, or only once. With a lottery (the book's example), numbers are usually selected once. So, the permutations for a three digit lottery yield 10 * 9 * 8 = 720 possibilities, not 1000.
Overall I liked Perfect Passwords. This is a great addition to any security professional's library, and it contains many sound suggestions.
Contents: Passwords - The Basics and Beyond; Meet Your Opponent; Is Random Really Random?; Character Diversity - Beyond the Alphabet; Password Length - Making It Count; Time - The Enemy of All Secrets; Living with Passwords; Ten Password Pointers - Building Strong Passwords; The 500 Worst Passwords of All Time; Another Ten Password Pointers Plus a Bonus Pointer; The Three Rules for Strong Passwords; Celebrate Password Day; The Three Elements of Authentication; Test Your Password; Random Seed Words; Complete Randomness; Index
If you've been around computer systems for any time, you've heard the conventional wisdom on creating secure passwords. And regardless of how many times it's said, you still get users picking the word "password" for access to the payroll system. Burnett has created an easy-to-read, easily-understood guide on how passwords work, how passwords are usually chosen, and why most of those methods are really bad. But rather than just be gloom and doom, he also presents a number of techniques for generating long passwords that are easy to remember but that will resist virtually all efforts at password cracking. For instance, passwords of 15 to 20 characters with a mix of upper case, lower case, numbers, and special characters are resistant to every known form of cracking attempt (even rainbow lists). But how do you pick a word or words that meet that criteria? Maybe you use rhyming (poor-white-dog-bite) or repetition (email@example.com). Visualization is pretty good, too (Frozen banana in my shoe.) The phrases are nonsensical, but that's why they are not "guessable". And the diversity of the character set coupled with the length of the phrase means that the permutation possibilities are astronomical and can't even begin to be brute-forced with today's technology.
I'm not sure you could get every user in your company to read the book, but it'd be worth trying. It's a fast read at only 180 pages, and they could even benefit just by making sure their password isn't in the top 500 list. :)
There are LOTS and LOTS of tips and tricks in this book for forming long, memorable, and hard-to-crack passwords. But if all you're interested in is the Meat and Potatoes, I can shortcut the matter and give it to you here: "The Perfect Password" has eight (8) elements to it:
1. It has UPPERCASE letters (ABC...).
2. It has lowercase letters (def...).
3. It has numbers (123...).
4. It has spaces (" ").
5. It has punctuation (.,:;-!? and the like, usually used in sentences).
6. It has symbols (@&+=>$#*^~ and the like, usually NOT used in sentences).
7. It has respelling (i.e., no words that can be found in a
dictionary -- for example, using "kwean", and not "queen").
8. It has more than 15 characters, and the more the better.
That's it, Jack! If you can easily come up, on the spur of the moment, with a passphrase or password which meets ALL of these criteria, AND which is easy to remember... then YOU DON'T NEED TO BUY THIS BOOK, you've already got it made!
Otherwise, the aforementioned Tips & Tricks will come in very very handy. And not only that, it's (surprisingly!) entertaining, too -- like the annectdote about the author's 5-year-old son, whose password was:
(Shux, his son liked the letter "o", and he could count to the minimum password length of 15, so that's what the lil' kidlet tyke used, LOL!)
For those with Kindles, a Kindle version of this book is available: Click Here.
Buy this book. Please trust me, you won't be sorry. :)
This comment is directed at Amazon itself: Your product title (e.g., in the "This review is from" line) says "Perfect Password", but if you look at the book cover image itself, you can clearly see that the title actually is "Perfect Passwords" (plural on "passwords"). It irks me every time I see this discrepancy.
I think every system administrator will see one or two of their own personal passwords in the book...which is a wake-up call.
I was able to quickly read/skim the entire book, pull out all the useful tips in under an hour while my daughter was getting her braces tightened. A complete slow read would probably take a day. I think all system administrators should buy and understand this book.
Roger A. Grimes
This is a short book, but it's amazingly complete on the subject. I don't agree 100% with all of the policy advice he gives, but it's fascinating to read the real-life password analyses he's done. If you are just someone who wants to pick better passwords for yourself, you *might* like this book. If you are an admin trying to figure out a sensible password policy for your bailiwick, I *strongly recommend* this book to you. It won't take you long to read it, and you are almost certainly going to get some insights even if you are pretty experienced already. (I am, and I did.)
I'm glad I bought it, and I'm glad I read it.
Look for similar items by category
- Books > Computers & Technology > Computer Science > Software Engineering > Information Systems
- Books > Computers & Technology > History & Culture > Security
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems > Programming Languages