It doesn’t matter whether a brute force attack targets the central password file in the system, or, in the case of iCloud, the attacker obtained the Apple IDs of many users, these events prove how important it is to protect yourself against this obtrusive decryption method. When it comes to private system passwords, you can take matters into your own hands. Use combinations that consist of many different character types. In the best case, use both lower case and upper case letters, special characters, and numbers in your passwords. The more characters the password contains, the harder it is to crack.
The situation gets a little bit trickier when creating passwords for online services and the like. Here you are bound to the respective provider’s specifications. Typically, passwords have a maximum length of only eight characters and are often limited to letters and numbers – which doesn’t exactly fill you with confidence. If this is the case, you should definitely find out which precautions the website operators take in order to protect themselves against brute force attacks. If you are the operator of a web service with a log-in mechanism, this is your responsibility. There are two possible approaches:
- Secure the password mechanism
- Establish multi-factor authentication
Securing the password mechanism should actually be standard for any log-in, but as the iCloud scandal shows, this is not always the case. The point of the protection mechanism is to make the work of brute force software more difficult. This means that after a password has been entered incorrectly a certain number of times, no more attempts can be made and the entry feature is disabled. Furthermore, it is possible to increase the amount of time after every further attempt made to enter the password. You can also go a step further – like Apple finally did – and block the entire user account after a certain number of log-in attempts.
Many providers offer multi-factor authentication as an option. It makes the log-in process somewhat more complicated since a further component is needed in addition to the password. This could be answering a secret question, entering a PIN, or answering a captcha. The latter are small tests to determine whether the log-in process is being carried out by an actual person or – such is the case with brute force software – a robot.