Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Real Reasons Why Users Stink At Passwords
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
JulietteRizkallah
JulietteRizkallah,
User Rank: Ninja
9/29/2016 | 11:02:53 AM
Passwords and user behavior
Interesting commentary.  Any way you look at it, this password issue is not getting resolved any time soon.  Awareness and training will help marginally, but in the end users will always favor convenience over security.  MFA will certainly help but is not 100% secure either.  So what will it take?  Hard to say but it feels that in this particular area, user behavior analytics may help detect a compromised account shortly after the breach. So in this specific issue detection is critical since prevention seems difficult to establish (i cannot believe i am writing these words after preaching for so long that detection was not enough and prevention necessary!).  When it comes to passwords, continuing to think we can chnage human behavior is ludicrous and we need to think outside of the box towards new solutions.
T Sweeney
T Sweeney,
User Rank: Moderator
9/29/2016 | 11:47:37 AM
Re: Passwords and user behavior
Thanks for weighing in, Juliette. I've kidded security vendors for years about their inability to create smarter users. Clearly, training and trying to solve this password problem from the human side is not going to work. I agree with you that some sort of predictive analytics should be added. Unfortunately, the human factor in the equation means anything we come up with will be imperfect/penetrable.
RyanSepe
RyanSepe,
User Rank: Ninja
9/29/2016 | 1:36:34 PM
Re: Passwords and user behavior
I think an additional parameter is cost. Biometric authentication under MFA can strengthen authentication substantially but is costly to implement. Still needs to be a consideration depending on the value of the data each individual is protecting and the varying levels of acess provided.
RyanSepe
RyanSepe,
User Rank: Ninja
9/29/2016 | 1:38:39 PM
Re: Passwords and user behavior
I understand this article seems to be more directed towards the consumer space but biometric controls are becoming more prevalent for consumer devices such as fingerprint.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:02:32 PM
Changing password often
There was another study a few weeks back supporting the idea that changing password often has no impact on security, it might have been even a negative impact.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:04:33 PM
Re: Passwords and user behavior
"... Awareness and training will help marginally, ..." Mainly agree but password being the credentialing is a main problem. Not secure by nature.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:06:39 PM
Re: Passwords and user behavior
"... the human factor ..." Agree. We want things that are simple and not forcing us to remember things in our busy daily lives.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:09:34 PM
Re: Passwords and user behavior
"... additional parameter is cost ..." Agree. There is cost and there is privacy issues in the alternative solutions. Our DNA clearly indnetifies us uniquelly, of course we are not allowed to use it.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:12:29 PM
Re: Passwords and user behavior
"... fingerprint ..." For some reason fingerprints do not pickup on other devices other than mobile phones. I always use it on my iPhone but not on my laptop. It needs to be stable and easy to use across devices.
RyanSepe
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:19:47 AM
Re: Passwords and user behavior
Yes there needs to be consistency. I believe there are laptops that open via fingerprint I am just not sure as to the efficacy of that mechanism for laptops.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40942
PUBLISHED: 2022-09-28
Tenda TX3 US_TX3V1.0br_V16.03.13.11 is vulnerable to stack overflow via compare_parentcontrol_time.
CVE-2022-40912
PUBLISHED: 2022-09-28
ETAP Lighting International NV ETAP Safety Manager 1.0.0.32 is vulnerable to Cross Site Scripting (XSS). Input passed to the GET parameter 'action' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in cont...
CVE-2022-22523
PUBLISHED: 2022-09-28
An improper authentication vulnerability exists in the Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 Web-App which allows an authentication bypass to the context of an unauthorised user if free-access is disabled.
CVE-2022-22524
PUBLISHED: 2022-09-28
In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 an unauthenticated remote attacker could utilize a SQL-Injection vulnerability to gain full database access, modify users and stop services .
CVE-2022-22525
PUBLISHED: 2022-09-28
In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 an remote attacker with admin rights could execute arbitrary commands due to missing input sanitization in the backup restore function