Passwords are weak link in security chain
Article Abstract:
Intrusions into computer networks typically happen through stolen passwords. Most passwords are generated by users, who are too predictable in their choice of passwords. For instance, almost half of users choose the name of their partner, child or pet. Marianne Swanson, a computer expert at the National Institute of Standards and Technology, urges users to generate a more complicated password containing both letters and digits.
Publication Name: Security
Subject: Government
ISSN: 0890-8826
Year: 1999
User Contributions:
Comment about this article or add new information about this topic:
Shredder sales, services increasin
Article Abstract:
Total sales of paper shredders have leaped from 100,000 units in 1990 to around 3 million uits in 1998. The growth has been attributed to the increasing security concerns about the paper trails that may lead to the breach trade secrets, financial records, internal memos and client information. Among the leading suppliers of shredders are Security Engineered Machinery, MBM Corp and Lynde-Ordway.
Publication Name: Security
Subject: Government
ISSN: 0890-8826
Year: 1999
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Getting cameras to work in the dark. Real-time video capture system. Retail in the 21st century
- Abstracts: Location and history as determinants of urban residential density. Racial prejudice and residential segregation: the Yinger model revisited
- Abstracts: Infrastructure financing and urban development: the economics of impact fees
- Abstracts: Protecting the portables. Intercoms blend with other tech to strengthen security. Optical, mechanical turnstiles: tools for security enhancement
- Abstracts: Electric strikes back. A finer cut: new shredder helps enforce security policy. Sprinkler news not all bad