skip to main content
article
Free Access

The domino effect of password reuse

Published:01 April 2004Publication History
Skip Abstract Section

Abstract

One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.

References

  1. Adams, A., and Sasse, M.A. User are not the enemy. Commun. ACM 42, 12 (Dec. 1999), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. CERT. CERT Incident Note IN-98.03, Password Cracking Activity. CERT Coordination Center, Carnegie Mellon University, 1998; www.cert.org/incident_notes/IN-98.03.html.Google ScholarGoogle Scholar
  3. Harreld, H. Security: An uneasy alliance. Infoworld 23, 13 (Mar. 26, 2001), 42--44.Google ScholarGoogle Scholar
  4. Howard, J.D. An analysis of security incidents on the Internet, 1989-1995. Dissertation, Engineering and Public Policy, Carnegie Mellon University, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jesdanan, A. Spy case shows public risk: Names, passwords stolen at Kinko's Internet terminals. South Florida Sun-Sentinel (July 23, 2003).Google ScholarGoogle Scholar
  6. Kanaley, R. Login error trouble keeping track of all Your sign-ons? Here's a place to keep your electronic keys, but you'd better remember the password. San Jose Mercury News (Feb. 4, 2001).Google ScholarGoogle Scholar
  7. Morris, R. and Thompson, K. Password security: A case history. Commun. ACM 22, 11 (Nov. 1979), 594--597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Needham, K. Internet banking passwords stolen. The Sydney Morning Herald (Mar. 19, 2003).Google ScholarGoogle Scholar
  9. Sasse, M.A., Brostoff, S., and Weirich D. Transforming the "weakest link"---A human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3 (July, 2001), 122--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Schneier, B. Secrets and Lies: Digital Security in a Networked World. Wiley, New York, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Security Focus. Netopia 650-T ISDN Router Username/Password Disclosure Vulnerability. bugtraq id 1952, 2000; www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D1952.Google ScholarGoogle Scholar

Index Terms

  1. The domino effect of password reuse

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 47, Issue 4
              Human-computer etiquette
              April 2004
              90 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/975817
              Issue’s Table of Contents

              Copyright © 2004 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 April 2004

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format