Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naïve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
![]() |
|
![]() |
|
![]() |
|
![]() |
Apache, MysQL and PHP for Windows could be a nice... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
Time is money. And when you constantly have to divide... Read More
Those small USB drives have so many names, pocket drives,... Read More
How long do you think DVDs have around? 20 years?... Read More
Music lovers have been carrying around radios and other bulky... Read More
As the web has evolved, so have the methods of... Read More
CCNA FAQQ. What exams do I have to take to... Read More
Below you will find some useful information and comments about... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
The registry is where the computer stores information about the... Read More
I do a holiday letter every year and send them... Read More
Your first step in removing dangerous infections from your computer... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
With renting methods such as online DVD rental and pay-per-view,... Read More
Perhaps not yet, but the handwriting might be on the... Read More
What led them to this choice, as all four studios... Read More
After another security hole recently surfaced in Microsoft's Windows operating... Read More
Windows Media Player 10 has been full of bugs from... Read More
Introduction In this article I will clearly spell out the... Read More
Are you frustrated with your PC?Is it feeling sluggish or... Read More
Most people think that all you have to do to... Read More
Each of the items in the checklist below is part... Read More
I have always been interested in computers, but in the... Read More
I recently got an e-mail asking about virtual memory. The... Read More
1. Let your PC boot up completely before opening any... Read More
If you're like me, you occasionally find the ubiquitous mouse... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
Enhanced Definition Television ? also known as EDTV ? is... Read More
Each of the items in the checklist below is part... Read More
The United States Of America citizen feels that games is... Read More
The first step is: Start > My DocumentsSo you have... Read More
While most small businesses really do need to find a... Read More
You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More
The Internet is an awesome tool, but be careful and... Read More
Not so many years ago, homes across the country watched... Read More
CCNAs and CCNA candidates hear it all the time: â??Get... Read More
Computers are supposed to speed up our productivity?to help us... Read More
About mail-mergingMail-merging is the process of merging variable data and... Read More
PDA Medical BenefitsIf you are concerned about your medical history,... Read More
Getting a new computer should be an exciting and gratifying... Read More
It seems like fast never quite rates fast enough.No matter... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More
In the years of the dot com boom and bust,... Read More
I recently got an e-mail asking about virtual memory. The... Read More
As the owner of a Country Mall and Top Site... Read More
Plenty! When we made the decision to be our own... Read More
If you utilize a computer at home or work it... Read More
IntroOne of the big advantages of PCs over earlier types... Read More
I recently took a good look at what was keeping... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
How long do you think DVDs have around? 20 years?... Read More
Although there are many things that can affect the performance... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
Introduction In this article I will clearly spell out the... Read More
Google, in their march to stay ahead of the pack... Read More
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More
Up until the recent past, those who wanted to take... Read More
Passwords have a strange dual nature. The stronger and safer... Read More
Personal Technology |