Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
Barrington South Lincoln Stretch rentals .. Lockport Chicago limo O’HareAddressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
If you're like me, you occasionally find the ubiquitous mouse... Read More
"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More
Flash mp3 players come with an exciting array of features,... Read More
1. Before sitting down for coding, you must have formal... Read More
One of the most common questions computer users ask is,... Read More
Not sure what Windows registry is or how it works?... Read More
MMC and SDFlash memory is available in so many formats... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
Webmasters usually sit at their computers much longer in a... Read More
For those seeking to buy their first flat panel TV... Read More
A Computer in Your HandCarrying around an address book and... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
Do you remember the old saw about how computers would... Read More
Those small USB drives have so many names, pocket drives,... Read More
Everywhere you look today people are listening to personal audio... Read More
Maintaining your computer is extremely important ? especially if you... Read More
With the new technology used to transfer information to from... Read More
Getting started with video editing is very simple you only... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
Upgrading your processor will always speed up your computer, but... Read More
Digital Video Disc or as it is sometimes referred to... Read More
Perhaps not yet, but the handwriting might be on the... Read More
The registry is where the computer stores information about the... Read More
Downers Grove limo Chicago ..Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
It's hard enough as it is these days to get... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
With a little tweaking and with proper tools, you can... Read More
This is the third in a series of articles highlighting... Read More
First and foremost before I begin my ranting it is... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More
Plasma and LCD TVs are the latest trend in home... Read More
MMC and SDFlash memory is available in so many formats... Read More
Saving Lives With A Pocket PCFree medical downloads can be... Read More
When I first started studying for my CCNP, some of... Read More
Windows Media Player 10 has been full of bugs from... Read More
Many computer users are worried about their computer's performance. After... Read More
The basic language of the internet is html. If you... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
Upgrading your processor will always speed up your computer, but... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
Having two operating systems is not as difficult as many... Read More
Has This Ever Happened To You? OK.. it's Friday night,... Read More
So you got yourself a digital camcorder. If you want... Read More
I recently took a good look at what was keeping... Read More
Do you know how many fonts are currently installed on... Read More
If you utilize a computer at home or work it... Read More
Personal Technology |