[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

The domino effect of password reuse

Published: 01 April 2004 Publication History

Abstract

One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.

References

[1]
Adams, A., and Sasse, M.A. User are not the enemy. Commun. ACM 42, 12 (Dec. 1999), 40--46.
[2]
CERT. CERT Incident Note IN-98.03, Password Cracking Activity. CERT Coordination Center, Carnegie Mellon University, 1998; www.cert.org/incident_notes/IN-98.03.html.
[3]
Harreld, H. Security: An uneasy alliance. Infoworld 23, 13 (Mar. 26, 2001), 42--44.
[4]
Howard, J.D. An analysis of security incidents on the Internet, 1989-1995. Dissertation, Engineering and Public Policy, Carnegie Mellon University, 1997.
[5]
Jesdanan, A. Spy case shows public risk: Names, passwords stolen at Kinko's Internet terminals. South Florida Sun-Sentinel (July 23, 2003).
[6]
Kanaley, R. Login error trouble keeping track of all Your sign-ons? Here's a place to keep your electronic keys, but you'd better remember the password. San Jose Mercury News (Feb. 4, 2001).
[7]
Morris, R. and Thompson, K. Password security: A case history. Commun. ACM 22, 11 (Nov. 1979), 594--597.
[8]
Needham, K. Internet banking passwords stolen. The Sydney Morning Herald (Mar. 19, 2003).
[9]
Sasse, M.A., Brostoff, S., and Weirich D. Transforming the "weakest link"---A human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3 (July, 2001), 122--131.
[10]
Schneier, B. Secrets and Lies: Digital Security in a Networked World. Wiley, New York, 2000.
[11]
Security Focus. Netopia 650-T ISDN Router Username/Password Disclosure Vulnerability. bugtraq id 1952, 2000; www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D1952.

Cited By

View all
  • (2024)Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11Proceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664496(1-10)Online publication date: 30-Jul-2024
  • (2024)"I'm actually going to go and change these passwords": Analyzing the Usability of Credential Audit Interfaces in Password ManagersExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650889(1-13)Online publication date: 11-May-2024
  • (2024)PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern LeakageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339253319(5075-5089)Online publication date: 22-Apr-2024
  • Show More Cited By

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 47, Issue 4
Human-computer etiquette
April 2004
90 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/975817
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2004
Published in CACM Volume 47, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)426
  • Downloads (Last 6 weeks)75
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11Proceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664496(1-10)Online publication date: 30-Jul-2024
  • (2024)"I'm actually going to go and change these passwords": Analyzing the Usability of Credential Audit Interfaces in Password ManagersExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650889(1-13)Online publication date: 11-May-2024
  • (2024)PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern LeakageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339253319(5075-5089)Online publication date: 22-Apr-2024
  • (2024)Web Based Password Management System For Robust Applications2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)10.1109/SCEECS61402.2024.10482317(1-5)Online publication date: 24-Feb-2024
  • (2024)Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breachesInformation & Computer Security10.1108/ICS-05-2024-0116Online publication date: 16-Jul-2024
  • (2024)Enforcing security policies on interacting authentication systemsComputers & Security10.1016/j.cose.2024.103771140(103771)Online publication date: May-2024
  • (2024)How memory anxiety can influence password security behaviorComputers & Security10.1016/j.cose.2023.103589137(103589)Online publication date: Feb-2024
  • (2024)Sweeter than honey: Are Gmail accounts associated with greater rewards at a higher risk of hijacking?Computers in Human Behavior Reports10.1016/j.chbr.2024.10041014(100410)Online publication date: May-2024
  • (2023)A Systematic Review on Password Guessing TasksEntropy10.3390/e2509130325:9(1303)Online publication date: 7-Sep-2023
  • (2023)Augmenting Password Strength Meter Design Using the Elaboration Likelihood ModelInformation Systems Research10.1287/isre.2022.112534:1(157-177)Online publication date: 1-Mar-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media