Abstract
One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.
- Adams, A., and Sasse, M.A. User are not the enemy. Commun. ACM 42, 12 (Dec. 1999), 40--46. Google ScholarDigital Library
- CERT. CERT Incident Note IN-98.03, Password Cracking Activity. CERT Coordination Center, Carnegie Mellon University, 1998; www.cert.org/incident_notes/IN-98.03.html.Google Scholar
- Harreld, H. Security: An uneasy alliance. Infoworld 23, 13 (Mar. 26, 2001), 42--44.Google Scholar
- Howard, J.D. An analysis of security incidents on the Internet, 1989-1995. Dissertation, Engineering and Public Policy, Carnegie Mellon University, 1997. Google ScholarDigital Library
- Jesdanan, A. Spy case shows public risk: Names, passwords stolen at Kinko's Internet terminals. South Florida Sun-Sentinel (July 23, 2003).Google Scholar
- Kanaley, R. Login error trouble keeping track of all Your sign-ons? Here's a place to keep your electronic keys, but you'd better remember the password. San Jose Mercury News (Feb. 4, 2001).Google Scholar
- Morris, R. and Thompson, K. Password security: A case history. Commun. ACM 22, 11 (Nov. 1979), 594--597. Google ScholarDigital Library
- Needham, K. Internet banking passwords stolen. The Sydney Morning Herald (Mar. 19, 2003).Google Scholar
- Sasse, M.A., Brostoff, S., and Weirich D. Transforming the "weakest link"---A human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3 (July, 2001), 122--131. Google ScholarDigital Library
- Schneier, B. Secrets and Lies: Digital Security in a Networked World. Wiley, New York, 2000. Google ScholarDigital Library
- Security Focus. Netopia 650-T ISDN Router Username/Password Disclosure Vulnerability. bugtraq id 1952, 2000; www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D1952.Google Scholar
Index Terms
- The domino effect of password reuse
Comments