tssci security

Password Length >= Short/Complex

Roger at InfoWorld has been running a password-cracking contest for some time now and just recently received the first correct cracks at his first password: a 10-character password with normal complexity. The other two that have still yet to be cracked, is a 15-character password with no complexity (lowercase, one or more English words), and a 15-character (or longer) password with minor complexity containing one or more English words.

This doesn't mean that a short and complex password is easier to crack than a longer one with no complexity, though. The problem, is what we perceive as complex (meeting the requirements), is not really so. Here's why:

First, if you require an eight-character-minimum password, most users will choose an eight-character password. If you require a capital letter, they will put it at the beginning because we are trained in writing class to do that. If you require a number, most users will put the number at the end, and the number will be 1 or 2. Even though users have 94 characters to choose from on the keyboard, 80 percent of passwords will contain the same 32 characters and symbols..

In conclusion, longer passwords are better than shorter ones...

Gaim 2.0.0beta5

A new version of Gaim has been released, 2.0.0beta5. I cannot find release notes on this version, but I am going to try it out now.

We'll see if they have fixed the url translation bug when using the Jabber protocol.

For all the IS Managers

NIST has released SP800-100, Information Security Handbook: A Guide for Managers. I'm sure it'd benefit everyone in the security community, since you either are or one day will be a manager (or at least help make managers make more informed decisions). Here's a quick run down on the sections it covers:

  1. Introduction
  2. Information Security Governance
  3. System Development Life Cycle
  4. Awareness and Training
  5. Capital Planning and Investment Control
  6. Interconnecting Systems
  7. Performance Measures
  8. Security Planning
  9. Information Technology Contingency Planning
  10. Risk Management
  11. Certification, Accreditation, and Security Assessments
  12. Security Services and Products Acquisition
  13. Incident Response
  14. Configuration Management

Export U.S. Defense Information to China - Fun for the whole family!

Information Week is reporting a story involving a family of five, who await a hearing for charges of conspiring to export U.S. defense information to China.

Chi Mak, 66, of Downey, Calif., was an engineer with Power Paragon, a Navy contractor. He allegedly collected technical information about U.S. warship technologies, and then he and his wife, Rebecca Laiwah Chiu, copied it onto CD-ROMs. According to the U.S. Department of Justice, another family member then allegedly encrypted the defense data in preparation for a "surreptitious delivery" to the People's Republic of China. A report from the DOJ contends that Chi Mak received ''task lists'' that requested specific defense-related information, including information on Naval research into nuclear-powered submarines.

The sad fact is there are many, many more incidents like this happening that go unnoticed.

Classified Wiki?

The U.S. intelligence community recently unveiled Intellipedia, a top-secret wiki available to sixteen various agencies to share information and resources better. You can catch more on the story at GCN, Infowars, and a blog dedicated to Intellipedia!

My concern is information that was once compartmentalized, giving those with a need to know access, now makes 28,000 pages available to over 3,600 registered users. Three points need to be met before you are given access to classified information:

On the other hand, making information this "available", could help improve the accuracy and timeliness of reports now that the information has more eyes reviewing it. It definitely is a compromise, between having information confidential and having it available.

Hopefully this system will help our intelligence community make better, more informed decisions with regards to our national security.

« Newer entries — 56 — Older entries »

blog comments powered by Disqus