The History Of Passwords

Superior Essays
Employees are an important asset of any organization. In today’s digital world, employees must be educated on the important of security and how they can protect their organization’s information systems data. To do this, user access and identity must be managed properly to control the risks associated with confidential information and user data falling into the wrong hands. One way to manage user access is by using passwords to establish a user 's identity to gain access.
History of Passwords
Passwords have existed since ancient times long before the digital evolution began. In ancient history, they were referred to as watchwords, or words and phrases used to identify a friend or enemy. Polybius, a Greek historian, wrote about the use of these watchwords in military ranks. He described an example watchword as "a wooden tablet with the word inscribed on it". A soldier would receive the watchword, "[take] his leave, and on returning to his quarters passes on the watchword and tablet before witnesses to the commander of the next maniple, who in turn passes it to the one next him" (McGing).
Password use in the military went on to include a counterpassword. During D-Day, U.S. paratroopers identified each other using a password, such as "flash", and combining it with a counterpassword, such as "thunder". The password and
…show more content…
There are always risks associated with biometric data. Biometric information is irreplaceable, and if duplicated or stolen, cannot be reset. Some biometrics, such as fingerprints, can be duplicated via clay molds. Biometrics are becoming cheaper and easier for organizations to implement, but organizations and IT security managers must think about how users feel about tracking. They must consider the increased suspicion of new advances in technologies that today’s consumers and users care about

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    The usernames and passwords are a unique key to log into a computer or network. When computers have usernames and passwords enabled this adds a security feature so that if the computer is a sleeping state credential need to be input to unlock the computer. For example, if one user was to leave a computer open on his desk and went to do another task, another user or possibly an intruder that has gained access into the building can gain access to files on the computer or the network. Therefore, network administrators have an important role in providing the most reliable security by simply implementing user credentials.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    The article then goes on to talk about the current ways that we are using technology in biometrics. These include voice, DNA, facial features, and more.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Single-Sign-On Case Study

    • 892 Words
    • 4 Pages

    Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. In an enterprise where Single-Sign-On has not been implemented, some problems employees may experience are: 1. In the healthcare industry, it could be booming with single-sign-on.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the future, an all-in-one platform will be provided to the cops that will cater all the requirements of a cop. The policemen will be provided with a direct access to biometric data of the particular region so that concealing ones identity becomes nearly impossible for anyone. The already existing biometric data storage and identification process has many loop holes. It is predicted that in future this technology will be improved to higher levels ensuring personal privacy intact and precise levels of findings.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Myris Research Papers

    • 760 Words
    • 4 Pages

    2a. The computer based innovation represented by my computational artifact is called Myris. Myris is a biometric security system that scans one’s iris to algorithmically process video images of the user’s eye signing them into secure websites, devices and other personal profiles. The intended purpose of Myris is to eliminate the utilization of standard passwords and to create a secure and foolproof method for accessing personal data. Simply put, “It lets anyone sign into accounts on websites or applications and unlock protected files with a quick glance into the mirror on its face” (http://dickinson.is/designing/eyelock/).…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Serious Conundrum

    • 421 Words
    • 2 Pages

    You can also use a password manager from a managed IT company, such as our company in San…

    • 421 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    I will be drawing arguments and research results from theorists such as Monahan (2011), Bullingham and Vasconcelos (2013), and DeVries (2003) in order to argue the amount of lateral surveillance practiced in the gaming world (in other words: lack of privacy) that can be associated with the idea of users wanting to not only present their “best self” to those watching, but to also prove their “best self”, and be the best “best self.” With the advancements of technology throughout the years, lateral surveillance opportunities emerged within the online world, and had especially grown in popularity through online video game platforms. The idea that this peer-to-peer communication has flourished so effectively puts concern on both the sudden invasive powers users have on one another, and on…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Data Mining Essay

    • 798 Words
    • 4 Pages

    Although data mining has the ability to express data collected in a field in a way that can be beneficial. Some of the fruits of this labor are used for diagnosing patients, helping the elderly live independently and make commerce more profitable and efficient. The negative side is the acts of collecting personal health information, constant monitoring of people and extra taxes that are imposed. With our ability to collect more biometrics,…

    • 798 Words
    • 4 Pages
    Improved Essays

Related Topics