Profile

unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Unixronin

December 2012

S M T W T F S
      1
2345678
9101112131415
16171819202122
23242526272829
3031     

Most Popular Tags

Expand Cut Tags

No cut tags
Tuesday, October 2nd, 2007 06:02 pm

Today's User Friendly strip makes a security point I've commented on myself many a time:  If you make your password policy demanding enough, you can force all of your users to write their passwords down, and the odds are at least some of them will leave their password notes where they can be seen and/or found by someone who shouldn't have them.  At which point your carefully crafted password policy, proof against any but the most massive distributed brute-force attack, becomes vulnerable to the pizza boy who happens to glance at the receptionist's desk while chatting her up on his way through the front lobby.

Tags:
Tuesday, October 2nd, 2007 11:01 pm (UTC)


All security systems are vulnerable to social engineering as it's called. It can be quick or it can take time but eventually it can be done.

What I've seen of SecurID impresses me. It's not cheap but it's better then biometrics.

"Biometrics can be fun to exploit but keeping the parts alive is tough." --darkmeval. ;)

Consider that added to the quotables. ;)
Tuesday, October 2nd, 2007 11:53 pm (UTC)
Hardware tokens are a good system, I think. As [livejournal.com profile] schneier is wont to comment, the most secure authentication systems are those that require a combination of something you have, something you are, and something you know.
Wednesday, October 3rd, 2007 12:54 am (UTC)
my sole complaint against the SecurID was their their server portion ran only on Solaris or Windows (I had a 5 unit eval kit with the server and keys for a while). But again, follow Schneier's comments that they should not be used in isolation.