{"id":955,"date":"2009-02-14T15:33:07","date_gmt":"2009-02-14T23:33:07","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=955"},"modified":"2009-02-14T21:07:44","modified_gmt":"2009-02-15T05:07:44","slug":"weak-password","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/14\/weak-password\/","title":{"rendered":"Weak Password"},"content":{"rendered":"<p><!--[if gte mso 9]&gt;  Normal 0     false false false  EN-US X-NONE X-NONE              MicrosoftInternetExplorer4              &lt;![endif]--><!--[if gte mso 9]&gt;                                                                                                                                            &lt;![endif]--><\/p>\n<p>According to <a href=\"http:\/\/news.yahoo.com\/s\/afp\/20090212\/od_afp\/ussocietyinternettechnology_20090212004613\">yahoo!News<\/a>, the statistics of 28,000 passwords that are recently stolen from a popular US website that is posted in physorg.com\u00a0 \u201c16 percent took a first name as a password \u2026 14 percent relied on the easiest keyboard combinations to remember such as \u20181234\u2019 \u2026.\u201d People tend to use passwords that are easy to remember such as names, their favorite words, etc. Since most people have many accounts, in order to manage their log in passwords, they intend to chose easy remember password.<\/p>\n<p>One way to prevent people from using weak password is for them to have a built-in password checker when the users register new account or wanted to change their passwords(like the one that is posted <a href=\"http:\/\/www.microsoft.com\/protect\/yourself\/password\/checker.mspx\">here<\/a>).\u00a0 There should a requirement for the password length and combination. A secure password has to be at least 8 characters long and it \u201cshould include a combination of uppercase and lowercase letters, numbers, and symbols.\u201d Moreover, it would be helpful if there are short side note on how to create secure password.<\/p>\n<p>The attacker can compromise people\u2019s accounts using these easy-to-remember passwords and they have about 40 percent chance to get it correct. Other than that, users tend to write their passwords down on their notes or PC. By doing this, attackers can easily get access to users\u2019 computers and get their passwords.<\/p>\n<p>If people think that their account for a website is not that important to them, they won\u2019t even bother to change their passwords to stronger ones. They believe that even though they have weak passwords, their accounts won\u2019t be attacked.\u00a0 On the other hand, people would probably change their weak passwords to more complex ones for financial account such as banking account or private account like Gmail.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to yahoo!News, the statistics of 28,000 passwords that are recently stolen from a popular US website that is posted in physorg.com\u00a0 \u201c16 percent took a first name as a password \u2026 14 percent relied on the easiest keyboard combinations &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/14\/weak-password\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,7],"tags":[],"class_list":["post-955","post","type-post","status-publish","format-standard","hentry","category-current-events","category-ethics"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=955"}],"version-history":[{"count":11,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/955\/revisions"}],"predecessor-version":[{"id":965,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/955\/revisions\/965"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}