Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’HareFile permissions are one of the strengths that the Unix... Read More
Flash mp3 players come with an exciting array of features,... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
In the first part of this home lab tutorial, CCNA... Read More
All of us are familiar with the pyramids of Egypt.... Read More
Your first step in removing dangerous infections from your computer... Read More
If you have a computer for home use or for... Read More
Projectors have come a long way in the past few... Read More
All over the world, people carry with them walkmans and... Read More
As the Web grows more crowded and just plain "noisy"... Read More
Most people think that all you have to do to... Read More
JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More
When you think of a help desk, what do you... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
After reading this good article you will know some important... Read More
You have your television and home theater receiver; you just... Read More
Buying a receiver is one of the most important decisions... Read More
Getting started with video editing is very simple you only... Read More
For many people the computer industry is a seeming unsolvable... Read More
iPod users start to get the picture and it's turning... Read More
In this era of Internet, most people are frequent users... Read More
Have you ever thought about building your own computer system?... Read More
Windows Media Player 10 has been full of bugs from... Read More
The DNS (Domain Name System) servers are what your computer... Read More
With renting methods such as online DVD rental and pay-per-view,... Read More
taxi o'hare Auburn ..Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More
I recently took a good look at what was keeping... Read More
One of the most confusing parts of beginning your Cisco... Read More
Selecting a TV isn't as easy as it used to... Read More
ASR (Automated System Recovery) is a feature available on the... Read More
It's hard enough as it is these days to get... Read More
We have just entered the time of year that most... Read More
Apache, MysQL and PHP for Windows could be a nice... Read More
I am going to assume that you are running windows... Read More
Heading off on vacation soon?Then perhaps you're tempted to take... Read More
Buying Your PCBuying a PC that's right for you and... Read More
System File Checker is a great utility that is typically... Read More
Introduction In this article I will clearly spell out the... Read More
For many people the computer industry is a seeming unsolvable... Read More
"Automated Testing" is automating the manual testing process currently in... Read More
There are many sources of heat that can raise the... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
1. Let your PC boot up completely before opening any... Read More
JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More
This is the third in a series of articles highlighting... Read More
We've all seen them, you've been browsing a website and... Read More
The battle is heating up for market share, home movie... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
MP3 players are everywhere! It seems that the number of... Read More
Have you ever tried to remove Spyware off your PC... Read More
Personal Technology |