Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Password Protection?

By Jeffrey Dingle
October 8, 2008


As technology gets better, it often also becomes more complicated for the average user. The balance between security and convenience is a constant battle. Passwords are a good example, as a password is access control at it’s most basic. Passwords restrict access to many things, providing protection to information.

   
IT specialists agree that more complex passwords provide greater security. A good password now must be eight characters or more, with a combination of uppercase and lowercase letters, combined with numbers and special characters. Security specialists know that as passwords become more complex, people tend to not be able to remember them, so they write them down and hide them. It’s no secret that passwords are hidden under calendars, under telephones and in the Rolodex under “c” for computer or “p” for password.



The Emerging Password Threat

Now a new threat has emerged. The original concern of the written down password being found has been replaced by the concern of the password being retrieved.

   
As passwords continue to get more complicated, procedures to retrieve forgotten passwords have been developed for the user. The procedure generally involves the use of “secret questions” that must be answered to either provide the password or to reset the password.

   
A recent paper presented by Ariel Rabkin of UC Berkeley addressed the new threat.

   
A study of online criminal markets has found that stolen bank login credentials are highly valued by criminals. To meet this threat, banks have developed increasingly sophisticated authentication methods, including a requirement for a user to pick a “strong” password, not easily guessed by an attacker. To meet the balance between security and convenience, banks often couple their password authentication with some sort of “lost password” mechanism, which users can fall back on if they have forgotten their passwords.

   
A solution used by many banking sites has been to rely on security questions. These come in two varieties. One sort of question asks about sensitive (though not necessarily private) information such as Social Security and bank account numbers, and ATM PIN codes. Another set of security questions, personal security questions, ask about personal history and family background, such as one’s mother’s maiden name. Personal security questions, in turn, can be divided into those selected by the user from a menu of choices, and those specified entirety by the institution, such as zip codes, mother’s maiden name or date of birth. Use of these types of questions benefits the user, as they are typically unambiguous and involve easy-to-remember answers.

   
When Rabkin sampled actual questions used by institutions, names of friends and family were a common topic. After gathering over 200 questions from different sites, there were 34 questions about first names, 13 about middle names and 10 about last names and nicknames. Four sites out of eleven sampled asked about grandmother’s first names, six asked the name of your favorite pet, while mother’s maiden name came up three times compared to four each for high school mascot and favorite sports team.



Social Networks’ Dirty Little Secret

Facebook is technology on a crash course with password authentication. How is Facebook a threat? A little bit of knowledge goes a long way. An overwhelming majority of today’s college students and recent college graduates maintain an account at a social networking site, such as Facebook, MySpace or LiveJournal. These sites allow users to expose structured information about themselves, such as their educational background, age, birthday, friends via their personal profiles. Also note that social networking sites are not typically viewed as needing strong protection, and may represent a privacy risk to users.

   
Public posting of private information can help an attacker gain the knowledge necessary to answer the security questions and allow forgotten password access to an account. Rabkin noted, “Roughly 12 percent of our sample was automatically attackable, meaning that the answers to those questions could be found on a social networking site.”

   
A great deal of other personal information used for authentication, such as date of birth or ZIP code can also be found in public records, again easily accessible on the Internet. An attacker who knows the victim’s identity can get answers to job related questions by viewing commonly available employer Web pages posting bios, staff resumes and the like.

   
An online account that I have asked me to verify “security questions” – my questions were: “Who was your first employer (first job)?” and “What is the last school you attended?” The answer to both of these questions could be easily found on many Facebook pages.

   
As we make things more secure, password retrieval protocols increase the options that the bad guys have to get at the things we value. Know what of your personal information is accessible through the Internet. We teach children to be careful not to expose too much information about themselves on the Internet; perhaps we should be teaching adults the same thing.   

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Dingle is assistant director of special projects for LSI, a U.S.-based anti-terrorism, homeland security and physical security training company. He has been a Federal Criminal Investigator, security manager at a FORTUNE 15 company and ran the security operations for a former U.S President for eleven years. He can be reached at JeffDingle@LSIeducation.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • How Secure is Your Wireless Security?

    See More
  • Security Training Solutions at LSI

    See More
  • Preventing Cargo Crime with Access Control

    See More

Related Products

See More Products
  • Physical Security and Environmental Protection

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing