Phone no: +234 705 673 3798 or email us: info@kdesglobal.com
How might a miscreant get your data onto their computer? You could lose a flash drive when it drops out of your pocket. Maybe you leave your phone in an Uber ride. A hacked cloud service could expose some of your files to other people, or malware could copy your data to someone else's computer without your knowledge.
The point is that while brute-force attacks aren't effective in some places, there are still ways hackers can deploy them against your data. To avoid situations where a brute-force attack could crack protections on your data, you should keep close track of where your devices and files are.
There are a number of defenses that websites and other tools use against brute-force attacks, as well as ways to protect yourself against them.
1. Account Lockout: This is One of the simplest and most commonly used protections against Brute-force. With this, if you enter an incorrect password a certain number of times, the account refuses to accept any more login attempts. To try again, you need to get in touch with customer service or wait a certain amount of time.
This stops a brute-force attack in its tracks—instead of trying thousands of combinations in minutes, having to wait for 10 minutes or an hour to continue trying will deter a would-be hacker.
2. CAPTCHA challenge: Having to fill out a CAPTCHA every time you want to try a password greatly slows down the process, hence, defeating the point.
Neither of these methods will work against a reverse brute-force attack, though. Those attacks only fail a password test once for each account, which likely won't be enough to trigger the protection.
It's worth noting that while these tactics are great for avoiding brute-force attacks, they also provide other ways to attack a site. For example, if a brute-force attack is launched against a site that locks accounts after five incorrect attempts, its customer service team could get flooded with calls from legitimate users, thus slowing down its operations.
Overwhelming a site/server with brute-force attempts could also be employed as part of a distributed denial of service attack.
3. Two-factor authentication This is a powerful way to protect yourself against brute-force attacks, for both standard and reverse. With two-factor authentication (2FA), even if a hacker does guess the right password, having to enter another code will stop an attacker from getting access to your account.
4. Longer Password: By far, though, this the easiest way to protect yourself against a brute-force attack. As the length of a password increases, the computational power required to guess all the possible character combinations grows exponentially.
Considering the iPhone passcode example from earlier. Older versions of iOS used a four-digit PIN, which has 10,000 possible combinations. Modern iOS versions, however, use a six-digit passcode by default. This increases the number of possible combinations to one million.
In either case, it's unlikely that someone would be able to actually brute-force your iPhone password, partially thanks to the lockout that happens after a few wrong guesses. But you can see that by adding just two more digits, the protection factor increases 100 times.
5. Complex passwords: In addition to length, complex passwords are also much harder to brute-force. If someone wanted to break a password and knew that it only had lowercase letters, they could skip many possible combinations. But that same password length with numbers, uppercase letters, and symbols thrown in would increase the time to brute-force the password by several order of magnitudes.
6. Use secure passwords: Ideally with a password manager so you don't have to remember them all—and you'll be all but immune to brute-force attacks. A 12-character password that uses uppercase and lowercase letters, numbers, and a pool of 18 symbols would have more than 68 sextillion possibilities. This would take centuries to brute-force.
Read Now Top 15 Reasosns why you need a website for your BusinessYou don’t need to do all of these alone, We got you covered!! Contact us now your satisfaction is always our priority. price definitely won't be a problem.
« Previous Difference Between Decimal, Float and Double in Microsoft.Net |
Next » Differences between .NET Framework & .NET Core Framework |
Written by: IDIKA DESTINY EMEKA
Reading time:
Published 2 Years Ago On Sunday, January 30, 2022
Updated 2 Years Ago On Sunday, January 30, 2022
640 Views