Password Topology Histogram Wear-Leveling: PathWell Approach - Rick Redman
Offered By: YouTube
Course Description
Overview
Explore password security concepts and advanced defense strategies in this 55-minute conference talk from Passwordscon 2014. Delve into classic password cracking techniques and defenses before examining recent trends that give attackers an advantage. Learn about naive and selective brute force attacks, predictable password topologies, and real-world examples from organizations. Discover the innovative PathWell system for password topology histogram wear-leveling, including its effectiveness, implementation modes, and potential configurations. Gain insights into measuring topology changes, keyspace reduction costs, and future directions for the PathWell project.
Syllabus
Intro
Classic Password Cracking
Classic Defenses
Recent Trends: Attacker Advantage
Naive Brute Force
Selective Brute Force-Password Patterns
Predictable Password Topologies
Sample Organization #1
How about harder passwords?
Topology-Related Defenses
PathWell: Password Topology Histogram Wear- Leveling
Topology Wear-Leveling Effectiveness
Minimum Topology Change
Measuring Topology Change: Levenshtein Distance
Cost of Topology-Related Defense: Keyspace Reduction
PathWell Audit Mode
PathWell Enforcement Mode
Example Configurations
PathWell: Next Steps for the Project
Free Topologies
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network