text
stringlengths 0
118
|
---|
organizations request Social Security Numbers or login information via |
email, then they confuse people. Standardizing people’s expectations about |
what is legitimate and what is not will help close off many ways that |
hackers use to trick people. |
Encouraging Balanced Security Measures |
Counterintuitively, if security measures are too protective, they might lead |
to bad security outcomes because people create workarounds and other |
dangerous kludges that bypass protective systems entirely or weaken them. |
For example, requiring two factors for authentication is generally a good |
security measure. However, requiring two factors every time someone tries |
to login from a particular device can be counterproductive because people |
might grow frustrated and disable the service. Allowing people to check a |
box to trust certain devices after using two-factor authentication for the first |
time will help ease the inconvenience. In another example, which we |
discussed earlier, if people are forced to select passwords that are too long |
and complex, they will write them down on sticky notes near their |
computers, which opens up another major security vulnerability.63 |
Good public health frameworks are careful not to ask too much of |
people and instead seek to find the right balance between protection and |
feasibility to ensure measures can be implemented across an entire |
population.64 It seems commonsensical, yet organizations regularly design |
their systems in ways that make us and our data less secure. |
ELIMINATING IMPOSSIBLE SECURITY PRACTICES AND ADVICE |
Several common security measures are not practical for people to do. The |
law should discourage the use of security measures that fail in this way. |
Instead, however, the law perversely encourages such measures. Regulators |
often look superficially at an organization’s security, faulting organizations |
that don’t use certain measures. Thus, security professionals might follow |
the same old faulty security measures because they fear that regulators will |
zing them for missing measures on the checklist. Regulators and the law |
must ensure that they stop playing a role in furthering this pathology. |
If these measures were to be abandoned, what would work better? An |
improved strategy to help people with passwords is to use password |
managers to store them electronically in one account. Password manager |
services help people create strong, unique passwords, warn them when their |
passwords are bad, and save them the trouble of remembering the |
potentially thousands of passwords they use to access their accounts. Even |
these services are typically secured, at least partially, by a password |
themselves. Although these services are typically a better way of generating |
and keeping track of your passwords, like anything on the Internet, they are |
not without risk. |
Without a password manager, we recommend different passwords at |
work and for personal accounts. But beyond this, we don’t recommend a |
different password for every account. People can have hundreds of |
accounts, and it’s not possible to remember hundreds of passwords. It is |
easy to find cases of password re-use and chastise people, but that’s asking |
the impossible and scapegoating. What would be far better is to ensure that |
different passwords are used when it really counts—such as work accounts |
—and not as a matter of course. |
Regarding not writing passwords down, it is impossible to remember |
many passwords. People must write them down. Instead of exhorting |
people never to write passwords down, the advice should be about where to |
write and keep them. People should not put them near the workplace |
computer or carry them in wallets. But suppose a person kept a list of |
passwords in a dresser drawer. Conceivably, a hacker could break into the |
person’s home, rummage everywhere, and find the passwords in the dresser. |
But this is unlikely and is low risk. Of course, it is still a risk, and rigid |
approaches to security would try to stamp out this practice to eliminate the |
risk. The problem is that trying to reduce this low risk might ultimately |
induce people to engage in more risky behavior. |
Good security is like good parenting. Parents soon learn to pick their |
battles. They can’t win them all. Designing security practices to reduce all |
risks, even the small ones and trivial ones, can weaken human responses to |
risks that are more severe. The perfect becomes the enemy of the good. |
TWO-FACTOR AUTHENTICATION |
In security, there are other solutions to authentication problems and |
methods of authentication that can be used if organizations moved away |
from passwords alone. Many relatively cheap and easy-to-deploy methods |
can be used to protect against different kinds of attacks on credentials. |
One means of authentication that accommodates human limitations is |
two-factor authentication. The essence of two-factor authentication is |
simple. To login, you must have something you know (usually a password), |
as well as one additional factor, usually something you have (e.g., your |
cellphone). |
Two-factor authentication is promising because it has already been |
deployed by major companies, it protects against many different kinds of |
offline attacks, and it can leverage a technology that most people already |
constantly carry around—their cellphone. Two-factor authentication is a |
good way to protect against both online and offline attacks. While two- |
factor authentication remains vulnerable to specialized phishing and |
malware-based attacks, those vulnerabilities are relatively narrow and |
typically require the fraudster to already have a person’s username and |
password. |
Two-factor authentication is not a silver bullet that addresses all the |
problems with passwords. There are no useful silver bullets in data security. |
But there are some measures that will reduce risk. |
Although many of these techniques are widely available and |
inexpensive, they are often not used. Change is not likely to happen fast |
enough without regulatory intervention. Perhaps a nudge, maybe a gentle |
push, or maybe a forceful shove will be needed. The law should promote |
security measures like two-factor authentication that are practical in light of |
human behavior. |
ANTICIPATING HUMAN PROBLEMS |
Companies often deprecate their software and Internet-connected devices |
and stop supporting them. They often ignore how attached people are to the |
tools they use. They tell people to simply stop using them. This isn’t |
realistic. People won’t just stop using old devices and programs; they often |
have too much invested in the software to just give it up at the command of |
a tech company. The difficulty in moving on is a data security problem. |
Time and again, hackers have targeted deprecated software and devices, |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.