|–ū©'ß Personal Technology Library|
Passwords and the Human Factor
Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a naÔve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
Cisco Certification: Building Your Own Home Lab, Part I
CCNAs and CCNA candidates hear it all the time: ‚??Get some hands-on experience‚??. From my personal experience climbing the Cisco certification ladder, I can tell you firsthand that there is no learning like hands-on learning. No simulator in the world is going to give you the experience you will get cabling and configuring your own routers.
Compare MP3 Players for the Coolest Features and Sweetest Deals
How can you compare mp3 players to be sure you're getting the best features and price? You've checked some mp3 player ratings, and they're helpful. But iPod reviews and ratings don't answer all your questions. So how do you decide?
How to Save an Image in a SQL Server Database?
Most of the web applications have a lot of images used in it. These images are usually stored in a web server folder and they are accessed by giving the relative path to the file with respect to the root folder of the website. .Net being the platform for distributed application now, ASP.Net can be used to store images that are small to be stored in a database like SQL Server 2000 and later versions. For this purpose the SQL Server database provides a data type called "image" which is used to store images in the database.
How Does My PC Get Hot
There are many sources of heat that can raise the temperature in your PC. No, I'm not talking about the Tabasco sauce you dripped over your keyboard when you ate that bowl of chili at your desk, and no, I'm not talking about that Pamela Anderson (or Ricky Martin poster, depending on your taste) above your desk. Heat can come from external and internal sources. Let's take a look at those different heat sources, identify them and see what can be done to eliminate the problem.
Tips For Getting Technical Support Help Online
Sometimes your PC will start acting strange for no apparent reason or a program which you use regularly will all of a sudden stop working as it should. This can be a frustrating experience especially if you have no idea where to go for help. If this happens to you, don't panic! Here are some simple tips which may turn your frown upside down.
SOBIG.F Virus Promises Ill Be Back
On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F threat to a category 4.
An All Too Familar Pain
Lost & Found for the 21st Century
Tips for Buying a PC
Buying Your PC
Windows PDA Medical Software Benefits
PDA Medical Benefits
Do Higher Digital Camera Prices Mean Better Cameras?
Understanding digital camera prices makes finding the best camera value much easier. Uncovering digital cameras best buys is easier if we know what's available within various price ranges. With that in mind let's explore camera prices in more detail.
Computer Consulting 101 PC Troubleshooting Advice
While most small businesses really do need to find a good local computer consulting business to take care of their computer problems, there are some computer problems that are simple enough for even a technophobe to handle. At Computer Consulting 101, we've found there's one very simple piece of advice that often doesn't get communicated to non-technical small business end users: When in doubt, reboot first.
Customize Your Portable Player with an MP3 Player Accessory
Everywhere you look today people are listening to personal audio players. And many look for ways to personalize and/or enhance their experience. That's where the mp3 player accessory comes in.
Simple Overview Of Computer
Computer is an electronic machine work on the instructions of human being. In other words you have to input data to get your required output. Sure it has its own intelligence which is hidden from a user, that help in accurate and speedy calculations.
Dont Let the Internet Overstimulate Your Mind
The Internet is an awesome tool, but be careful and aware that the cloud of over stimulation doesn't invade your mind.
Why Get a Microsoft MCSE Certification?
In the years of the dot com boom and bust, the Microsoft MCSE Certification has gotten its eye blackened over an over. Paper Microsoft MCSE's who were excellent at finding brain dumps and passing exams gave the Microsoft MCSE Certification a bad name. What used to be a guarantee of a nice salary is now ridiculed in some ignorant circles. After working in the Information Technology field for twelve years I still believe the Microsoft MCSE Certification is worth every dollar you spend and every hour spent in study and practice. I'll share my history with the Microsoft MCSE Certification and why I still believe it's a valuable certification credential.
Linux Power Tools - Great Tools to Make System Administration Easy
World War II - Germany decided to attack Poland. Poland had many great warriors. They all prepared to fight the Germans. They were all ready with the best armor, the best and well trained horses, and ofcourse the best weapons , swords , spears .... And the Pols were brave and were ready to give their lives for their country. Sadly they did just that... give their lives. The Germans had tanks... It is very important to have the right weapons when one goes for a war.
The Benefits of Open Source
If you are a building a website or a forum, chances are you are using a web editor or paying for message board services. The costs of using these "out of the box" products can add up, especially if you are trying to grow your business. Let's look at some good "open source" options for you to consider. You may be surprised at how much money open source can save you.
Can Movie Theatres Compete with Home HD TV in the Future?
The battle is heating up for market share, home movie theatre, X-Box, Playstations and virtual reality take on the big screen and theme parks. You might be surprised to learn that the war is just beginning. You won't believe how high the stakes are now and what lengths they are willing to go to get your dollar.
What are the Main Components of Any Computer, and Which are the Most Critical to Its Performance?
Computers are everywhere, and vary in specification, brands, sizes, shaped, and prices. However, there is one common characteristic among all computer systems.
JVCs First Three-Layer Combo-Disc Blu-Ray / DVD
JVC developed and used a high-performance reflective film to produce this revolutionary three layer structure. The outer Blu-ray layer can be read by the blue light laser but it is transparent for the red light laser which therefore has access to the inner dual DVD layer.
|Home | Site Map|
|Copyright © 2005-2008 - DoC's pcMedix Computer Group Help Sites. All Rights Reserved.|