Table of Contents |
Usernames and passwords are vital to network security because their whole purpose is to control initial access to the network. Even if the system administrator assigns individuals their usernames and passwords, users can and often do change them, so you need to make sure your network’s users know the difference between a good password and a bad one and how to keep their passwords safe from theft.
We will cover the important security issues related to user account and password management. Moreover, in the following sections, we will discuss more secure methods of authentication (two-factor and multifactor authentication) and a widely used concept in the enterprise networks called single sign-on.
The first step in managing access to network resources is through user accounts and the rights you assign to the network resources. System administrators usually maintain user accounts on a daily basis, doing things like renaming accounts and setting the number of simultaneous connections. You can also specify where users can log in, how often, and when; plus, you can adjust how often their passwords expire and delimit when their accounts expire as well.
EXAMPLE
Leaving the account active is a bad idea because the user to whom it belonged can still log in. This is clearly insecure, but simply deleting the account presents its own set of problems. If you delete an account, the numeric ID associated with that user will be lost, and it is through this number that passwords and rights to network resources are associated with the user account. When you disable an account, it still exists, but no one can use it to log in. Another good time to disable an account is when someone leaves for an extended period, like taking maternity/paternity leave or other medical leaves or going on sabbatical. Because it is really common for companies today to have contract and temporary employees, you need to know how to manage temporary accounts that will be used for only a short time and then disabled. Managing these temporary accounts is easy; you just set the account to expire on the employee’s expected last day of work.
There is a good reason to limit how many times a user can connect to the network. Users should normally be logged in to the network for one instance because they can only be in one place at a time. So, if your system is telling you that someone is logged in from more than one place, it is probably because someone else is using their account. By disallowing simultaneous connections, only a single user at a single workstation can gain access to the network using a specific user account.
You may also want to limit the specific location from which a user logs in because most of the time, your users will be logging on to the network only from their own workstations. Although this makes sense, this rule is not usually enforced because, sometimes, users move around without taking their computers with them or log in at someone else’s station to get their jobs done.
Network operating systems automatically give the network maintenance (or administration) account a default name. On Windows servers, it is “Administrator,” and in Unix, it is “root.” The best practice is to change these account names to make it more difficult for an attacker to gain unauthorized access to a server.
Authentication, in relation to computing, involves mechanisms for providing proof of the identity of a user logging on to a network or device. For example, when you unlock your smartphone using a passcode, fingerprint, or facial recognition, you are authenticating yourself to the device so that it allows you to access its functions and resources.
Like any other aspect of network security, passwords must be managed, and doing that involves ensuring that all passwords for user accounts follow security guidelines so that bad guys cannot easily guess or crack them. You have also got to implement certain features of your network operating system to prevent unauthorized access.
Strong passwords should be at least 8 characters, but they should not be any longer than 15 characters to make them easier to remember. You absolutely must specify a minimum length for passwords because a short password is easily cracked. The upper limit depends on the capabilities of your operating system and the ability of your users to remember complex passwords.
A strong password needs to include a combination of numbers, letters, and special characters. Special characters are not letters or numbers, but symbols like the following: $ % ^ # @.
EXAMPLE
A strong password would be tqbf4#jotld. It looks like gibberish, but remember that famous sentence, “The quick brown fox jumped over the lazy dog.”? Well, this particular password uses the first letter of each word in that sentence with a 4# thrown in the middle of it. You can do this with favorite quotes, song lyrics, and so on, with a couple of numbers and symbols stuck in the middle.If you want to test the strength of passwords to make sure they are nice and tight, you can use auditing tools like crack programs that try to guess passwords. Clearly, if that program has a really tough time or even fails to crack the password, you have a good one. It is best to not just use a regular word preceded by or ending with a special character because good crack programs strip off the leading and trailing characters during decryption attempts.
All network operating systems include built-in features for managing passwords to help ensure that your system remains secure and that passwords cannot be easily hacked with crack programs. These features usually include automatic account lockouts and password expiration. This is done by storing and recalling saved passwords locally. They make it practical to use longer, stronger passwords than you could remember otherwise..
Automatic account lockouts prevent hackers and users who forget their passwords, from trying to log in by guessing passwords. This is why most network operating systems will lock you out after a few unsuccessful attempts. Some will even disable the account. Once that happens, the user won’t be able to log in to that account even if they enter the correct password. This feature prevents a potential hacker from running an automated script to crack account passwords by continuously attempting to log in using different character combinations.
Password expiration and password histories support common practice where passwords expire after a specific amount of time. While this is debated because of users often using less secure passwords, most organizations set up passwords to expire every 30 to 45 days, after which the network’s users must all reset their passwords either immediately or during a preset grace period. The grace period is usually limited to a specific number of login attempts, or it may allow a couple of days.
In today’s enterprises, users can be overwhelmed by the number of points in the network where they may be challenged to identify themselves. Most users have to log onto the domain to have network access at all, and then there may be company websites that require an authentication process to access databases, secured drives, personal folders, and more. Single sign-on (SSO) helps users access multiple accounts with one sign-on event.
When users must remember multiple passwords, as the number increases, they begin to resort to unsafe security practices such as writing passwords on sticky notes, hiding passwords in their drawers, and even sharing them with coworkers. All of these practices undermine the security of the network.
A directory service is a database designed to centralize data management regarding network subjects and objects, including user accounts. A typical directory contains a hierarchy that includes users, groups, systems, servers, client workstations, and so on. Because the directory service contains data about users and other network entities, it can be used by many applications that require access to that information. A common directory service standard is Lightweight Directory Access Protocol (LDAP), which is based on the earlier standard X.500.
A digital certificate provides an entity, usually a user, with the credentials to prove its identity and associates that identity with a public key. At minimum, a digital certification must provide the serial number, the issuer, the subject (owner), and the public key. An X.509 certificate complies with the X.509 standard.
Multifactor authentication is designed to add an additional level of security to the authentication process by verifying more than one characteristic of a user before allowing access to a resource. Users can be identified in one of five ways:
The trade-off to all the increased security is an inconvenient authentication process for the user and the high cost of biometric authentication devices.
Source: This content and supplemental material has been adapted from CompTIA Network+ Study Guide: Exam N10-007, 4th Edition. Source Lammle: CompTIA Network+ Study Guide: Exam N10-007, 4th Edition - Instructor Companion Site (wiley.com)