Passwords have a strange dual nature. The stronger and safer the password the more likely it will be undermined by human weakness.
It is widely known that passwords are the most common means of access control. It is also common knowledge that passwords are the easiest way to compromise a system. Passwords have two basic functions. First, they allow initial entry to a system. Next, after access, they grant permission to various levels of information. This access can range from public data to restricted trade secrets and pending patents.
The best passwords are a lengthy and complex mix of upper and lower case letters, numbers and symbols. The tendency for people when using these formats is to write them down, store them on a hand held device, etc. thus destroying the integrity of the password.
The integrity of passwords can be circumvented through "Human Engineering." People can unwittingly make grave errors of judgment in situations that they may view as harmless or even helpful. For example, a password is shared with a forgetful employee and a system can be compromised. In more ominous cases, a con artist or hacker can phone a na?ve employee and present themselves as senior executives or help desk personnel and obtain that persons password. People have also been duped by callers claiming emergencies, cajoling or even threatening the employees job if a password is not provided.
These human lapses can be addressed through employee training and written policies that provide solid guidance and procedures in these circumstances. Training in information security, including password protocols, should be mandatory for every employee of the enterprise. Management support of this training and the security policy is critical to its success. To be effective, training should be repetitive with quarterly reviews of the company policy. There can also be frequent reminders, such as banners, about password security that appear during logons.
Management must not only support security measures, they must also provide a written and enforced policy statement. These written policies should be developed with assistance from the I.T. department as well as the human resource and legal departments. Written policies should be a part of the employee's introduction to the company and should be reviewed at least twice a year. It is also critical that the employee sign off on the document indicating that they received, read, and understood its contents. Firms that ignore these practices do so at their own risk.
Enforcement is an important partner to training. A policy that is not enforced is far worse than no policy at all. In fact, haphazard enforcement or lack of enforcement can increase a company's liability in many legal actions. To work, a policy must have "teeth". There should be a range of consequences for lapses whether it is a single event or multiple or flagrant incidents. This can range from a verbal warning all the way to termination.
In summary, passwords can be kept more secure by recognizing the human factor. Through management initiative, communication and training, as well as written and enforced policies and procedures, companies can have more control over their information assets and keep their clients and partners much safer.
About The Author
Terrence F. Doheny
President, Beyond If Solutions,LLC
shuttle from Midway Glen Ellyn ..Using SQL Server 2000 and above versions you can retrieve... Read More
Do you know how many fonts are currently installed on... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
Those small USB drives have so many names, pocket drives,... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
1. Empty the Temp directory regularly. To do this, make... Read More
BIOS - Basic Input Output SystemThe central processing unit of... Read More
If you've been kicking around the idea of building your... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
If you don't have an mp3 player, and even if... Read More
About mail-mergingMail-merging is the process of merging variable data and... Read More
Has This Ever Happened To You? OK.. it's Friday night,... Read More
Maybe you always wanted a feature that hasn't been available... Read More
If you have a computer for home use or for... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
Are you thinking of buying an Apple iPod? Or have... Read More
The registry is where the computer stores information about the... Read More
I got my eyes set on a iPod mini, as... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
This is not your typical lost data story. I was... Read More
Lost & Found for the 21st CenturyIn today's hectic world... Read More
When you turn on your computer, does it act like... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Although there are many things that can affect the performance... Read More
shuttle from O'Hare North Chicago ..The technological horizon has always got something new to offer,... Read More
Unless you place your faith in internal search engine software... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Saving Lives With A Pocket PCFree medical downloads can be... Read More
Do you know how many fonts are currently installed on... Read More
That desk in front of you and everything else around... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
Tip #1 -- Rebates: A rebate is not always a... Read More
When browsing the internet you are likely to come across... Read More
The year is 1981. IBM has just released the Personal... Read More
Maybe you always wanted a feature that hasn't been available... Read More
There have been some questions on anti-skip protection on mp3... Read More
In Windows Xp, you can install two operating systems on... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
Confused by EDTV vs HDTV? We don't blame you. The... Read More
Tip #1. Do a Google search. Don't be to general... Read More
1. Let your PC boot up completely before opening any... Read More
Everywhere you look today people are listening to personal audio... Read More
System File Checker is a great utility that is typically... Read More
Projectors have come a long way in the past few... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
How familiar does the following sound? Your computer was working... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
Buying a receiver is one of the most important decisions... Read More
Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More
Personal Technology |