Personal Technology Information |
Passwords and the Human Factor
Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness. It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents. The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password. The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naďve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided. These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons. Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk. Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination. In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer. About The Author Terrence F. Doheny President, Beyond If Solutions,LLC
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 403, exiting |
RELATED ARTICLES
Compare MP3 Players for the Coolest Features and Sweetest Deals How can you compare mp3 players to be sure you're getting the best features and price? You've checked some mp3 player ratings, and they're helpful. But iPod reviews and ratings don't answer all your questions. Compile .BAT Files into Native Windows Applications (.EXE) Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files. 5 Steps to Remove Spyware for Free Have you ever tried to remove Spyware off your PC only tofind out it never left or it came back? Tired of all thoseannoying Popups, Viruses, and Ads on your system day in andday out? Well, listen closely because the day has come toremove Spyware programs and Viruses - forever!I will give you some very useful tricks and tips to removeSpyware and Viruses for good! Follow closely:Steps to Remove Spyware, Viruses, and Adware1. There are many types of software available today thatclaim to remove spyware off our system, but which one REALLYdoes the job? What you need is software that not only willremove spyware, but TOTALLY removes it for good and keeps itoff. Temporary Fixes to Spyware, Ad-ware, and Virus Infections So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner. Cisco Certification: Taking Your First Certification Exam Youâ??ve studied hard; youâ??ve practiced your configurations; youâ??ve used your flash cards over and over again; and finally, the big day is here. Your first certification exam!For many Cisco certification candidates, their first exam is the CCNA Composite exam or one of the two exams that make up the CCNA, the Introduction To Networking exam or the ICND (Interconnecting Cisco Networking Devices) exam. How to Switch to Firefox and Why You should First things first, what is Firefox? Well, it's a browser. Ok but what's that? A browser is a computer program used to view web pages, to browse through the world wide web. Faster Browsing Tips IF WE say that it was mainly because of the Windows operating system that a Computer could become a personal computer it would not be an exaggeration. The revolution is still on. How To Have Two (Multiple) Copies Of Windows Having two operating systems is not as difficult as many of us consider. It just requires little hard work and some good equipment. 5 Steps to Removing PC Clutter It's hard enough as it is these days to get organized and then remain that way for weeks and months down the road. We are all very busy people, some of us with 9-5 jobs and one hour commutes, and others of us busy making our lives at home work for us, with children at tow and a variety of chores to do as well as errands to run. How to Protect your PC from Spyware in the Cyber Age Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse.. Setting File Permissions On A Unix Server File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis. 10 Easy Steps to Speed Up Your Computer - Without Upgrading 1. Empty the Temp directory regularly. Font Organizers Review, Part I Do you know how many fonts are currently installed on your PC? What is the difference between OpenType, TrueType, PostScript Type 1 and Printer fonts? If the answer is 'No', it's time to consider getting a font organizer.TypografThis extremely well-done 32-bit app lets you preview, print, and manage TrueType and Type 1 fonts. Back Up, Back Up, Back Up! This is not your typical lost data story. I was a good girl and I kept my files on the network drive just like the company recommended. Windows PDA Medical Software Benefits PDA Medical BenefitsIf you are concerned about your medical history, the Internet has some great windows medical pda software that is available for free. Freeware is all the rage, and finding good quality freeware that is medically related is easy and fun. Three Things You Can Do to Keep Your Computer Running at Maximum Performance Although there are many things that can affect the performance of your computer, there are a few simply things you can do each month to help keep your computer running at maximum performance. This article will focus on two problems that impact the performance of your computer and will then explain what you can do about it. Looking For an MP3 Player? If you don't have an mp3 player, and even if you do, you should check out all the new stuff that's going on. I'm hoping this article will give you some idea of what kind of mp3 player you want and some tips on what to look for in an mp3 player. Lives With Games Tradition and Industry The United States Of America citizen feels that games is a part of their life while developed countries such as the United Kingdom and Japan would feels that Games is high prospects to gain profit either in domestic level or internationally. Games is very influence in human life at this time. How to Place Home Theater Speakers You have your television and home theater receiver; you just bought your new speakers and subwoofer and are ready to test things out. It's time to break out the measuring tape because precision is vital to achieving the full potential of your home theater system. Top 9 Ways To Speed Up Your Surfing & Computing It seems like fast never quite rates fast enough.No matter how quickly something moves, especially on theInternet, it could always move faster. |
home | site map | contact us |