The Domino Effect Of Password Reuse

Improved Essays
Ives, B., Walsh, K. R., & Schneider, H. (2004). The domino effect of password reuse. Communications Of The ACM, 47(4), 75-78. doi:10.1145/975817.975820

This is a brief cautionary article on the dangers of reusing a password across multiple applications. The authors give several examples of security breaches, but do not do a good job of illustrating that those security breaches were the direct or indirect result of a password re-use. Indeed, some of the incidents were a clear case of passwords being stolen and then used. While these incidents are definitely a password security issue, they do not indicate that password reuse is a concern. From there the authors examine the current state of password usage and make strong recommendations
…show more content…
The protocol uses public parameters the researchers state have the advantages of no trapdoor information associated with them, avoids transmitting certificates, and are accessible by any client and server making them very useful. The authors then launch into a very detailed mathematical proof of their theorem. Since a large portion of this article is dedicated to the proof of their theorem, the article can be somewhat difficult to follow. However, there is still some value to be had by the novice in their introductory explanation of how security systems are breached. Their conclusion that an attack can eventually compromise any security measure relying only on a password is especially profound and unsettling. Also, their contribution of trying to clarify the term forward secrecy is interesting. Protocols that ensure forward secrecy can maintain the security of password and login combination even if another combination of password and login are known. This deep dive look into the internal workings of security protocol construction makes this article, at least, worth perusing. Additionally, understanding that ultimately no system is completely secure is an essential first step in creating a management system. Users need to understand they can never be completely secure, but a system should exist where they are relatively secure and yet able to manage that security …show more content…
Ten different studies and personality scales were examined and used to create a 180 item questionnaire for the participants in an effort to assess neuroticism, conscientiousness, and extraversion. From there, the authors synthesized their findings in an attempt to quantify impulsiveness into four facets. The facets were urgency, lack of premeditation, sensation seeking, and lack of perseverance. This is a dense article, especially if one has little or no training in psychology. It is very technically oriented and goes into great depth and detail. While it may be difficult to appreciate how this study relates to passwords and their usages, we should never forget that a big piece of the password puzzle is the user. This study goes to great lengths demonstrating that even experts in the field of psychology have difficulty agreeing on how to classify human behavior and even greater difficulty explaining it. Therefore, it should come as no surprise the issue of passwords goes beyond simply what can be programmed into a computer. While this article may not have much practical take away for the information systems researcher, helping us to understand the wide expanse and complexity of the human mind is certainly worth the time to peruse this article. Clearly if the password dilemma is to be solved, we must understand

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    The usernames and passwords are a unique key to log into a computer or network. When computers have usernames and passwords enabled this adds a security feature so that if the computer is a sleeping state credential need to be input to unlock the computer. For example, if one user was to leave a computer open on his desk and went to do another task, another user or possibly an intruder that has gained access into the building can gain access to files on the computer or the network. Therefore, network administrators have an important role in providing the most reliable security by simply implementing user credentials.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    3. Use a Password Management Tool Phishing are made specially to gain usernames and passwords to steal sensitive or confidential information. The passwords management tool can be used to ease the staffs by changing their passwords after each important transactions and send messages for confirmation and their new and unique passwords. 4.…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The vulnerability of Security Security is a very important thing to people. If people don’t have security they lose a sense of comfort. In House on Mango Street by Sandra Cisneros and “What Security Means to Me,” by Eve Ensler both show security and what it means to them in their eyes. Security helps people get through daily life easier than without it. When people do not have security they become lost.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Passwords exist for a reason. The second reason this view is nonsense is because someone who is aware that they are being monitored will consciously or unconsciously change their thoughts and behavior just because he/she is aware that they are being recorded. Johann Wolfgang von Goethe a German statesman from the 18th century said “none are more hopelessly enslaved than those who falsely believe they are free”.21…

    • 530 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Hacktivism Analysis

    • 1372 Words
    • 6 Pages

    Computer hacking has become more than just tinkering with machine, it has become and idea (Heinzen,Picciano, 2008, p…

    • 1372 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It has been a long established conceit that two actor authentication is essential for secure remote access scenarios. Anyone who has accessed private networks from the internet is familiar with the concept in one form or another. Whether the additional factors include Smart Badges, Security Tokens, Soft Certificates (encrypted code downloaded to a device to identify it as genuine), or a combination of the above, using two factor authentication has become a familiar and even expected part of our computing security routine and rightfully so. Two Factor Authentication has been so effective at reducing information compromise that many services are quickly adapting its safeguards for internal use as well. We have all read the alarmingly increasing…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Slide 1 - INTRODUCTION This powerpoint presentation will define biometrics and present the argument for implementing authentication biometrics as an additional security measure for the organization. The presentation will evaluate each of the listed methods identifying the pros and cons of each system. Additionally, information regarding the costs associated with implementation and maintenance, and the error rate of each will be included in this presentation. Security authorization and identity have become one of the major ways that cybercriminals can attack and cause threats.…

    • 1456 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    The Paradox of Security The notion and terminology of security permeates our daily existence. One encounters it on a daily basis, qualifying almost every aspect of politics, international relations, human society, and personal experience. Indeed, society has arrived at a state, both locally and globally, where security needs to be addressed both habitually and emphatically.…

    • 1991 Words
    • 8 Pages
    Superior Essays