tag:blogger.com,1999:blog-3471471289744825428.post4361646723220947797..comments2024-03-11T00:31:41.186-07:00Comments on The Oregon Economics Blog: Passwords and ExternalitiesPatrick Emersonhttp://www.blogger.com/profile/17242234148546323374noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-3471471289744825428.post-88462925478248733462009-05-19T18:38:25.590-07:002009-05-19T18:38:25.590-07:00Stacy said so much, so clearly, and so succinctly,...Stacy said so much, so clearly, and so succinctly, that there is little I can add. And yes, Prof. Emerson, I did detect the irony in your tone. What I can say most of the security practices IT departments impose on their customers (users) are imposed on IT departments by auditors and governance committees. I have seen one IT manager (not me) fired for failing an audit.<br /><br />Governance and audit standards come from a variety of sources (SOx, CoBIT, HIPAA, ITIL), and impose a number of behaviors on IT departments. While many of these behaviors are positive and worthwhile, all IT practitioners know that a number of these behaviors and practices are performed simply to fulfill an audit requirement while providing no discernible benefit to the organization. Does anybody really believe the BofA Sitekey image (anti-spoofing technique) really prevents spoofing of their site? (Every heard of man-in-the-middle attacks?) BofA has bigger security holes to plug, but they got that one item off their checklist.Greg Thttps://www.blogger.com/profile/14077706740772451079noreply@blogger.comtag:blogger.com,1999:blog-3471471289744825428.post-5540625478284035302009-05-19T15:20:39.396-07:002009-05-19T15:20:39.396-07:00Stacy,
My attempt at ironic humor clearly fell fl...Stacy,<br /><br />My attempt at ironic humor clearly fell flat. My apologies, I did not mean to offend - I just tried to engage in some good natured joshing. <br /><br />Yes, I am blissfully uneducated of what I speak. My attempt was to show how individual incentives can be quite different than group incentives thanks to externalities. I decided to only show my persepctive because I had a feeling I could prod Dann into responding (which he did). But the truth is that the externalities work both ways: my compromised e-mail account is a minor drag for me but huge headache for the network administrators and all the folks who receive the penis enhancement e-mails. Which is precisely why it is so hard to get us nincompoops to use real passwords! The marginal cost is high but the private marginal benefit is low.<br /><br />I promise I shall never complain of password fatigue again! Really! I swear!<br /><br />Did I mention how much I love the people who work tirelessly to make my internets work so well? It's true! <br /><br />Anyway, I am sorry I touched a nerve and thank you for putting me in my place. Please don't turn off my e-mail...Patrick Emersonhttps://www.blogger.com/profile/17242234148546323374noreply@blogger.comtag:blogger.com,1999:blog-3471471289744825428.post-71287339849103726532009-05-19T15:07:01.767-07:002009-05-19T15:07:01.767-07:00> By the way, I love my IT helpers! Did
> yo...> By the way, I love my IT helpers! Did<br />> you all hear that? You are the best!<br /><br />Really? You have a funny way of showing it.<br /><br />> No, I am convinced that the only reason <br />> I have to do this is because it is <br />> convenient for the IT folks to make me<br />> jump through hoops.<br /><br />Do you really think that's how we spend our day, coming up with ways to make you waste your precious time? Let me tell you about what happens to OUR precious time when a password is compromised, specifically an email account password.<br /><br />- The compromised account is used to send spam, usually the pill-hawking penis enhancement kind. If we're really unlucky it's the disgusting porn spam kind.<br /><br />- Because the spam originates from our mail relays, other ISP and email services block OSU's email.<br /><br />- Then, someone from Network Engineering has to spend THEIR precious time contacting every single ISP that has blocked us and request that our mail relays be removed from their mailing list.<br /><br />> On the other hand, they don't have to <br />> pay any of the cost of making all of > us change our passwords all the time.<br /><br />And changing your password once a year takes what, 60 seconds of your time?<br /><br />Perhaps you should spend a moment to contact the email system administrator to inquire WHY this change is being implemented. I'm sure his response will be enlightening -- the goal is to consolidate logins across campus. Which, amazingly, will save your oh-so-precious time in the long run.<br /><br />Patrick, I've been a long time reader and have enjoyed your blog immensely. Unfortunately, this is a case where you're talking about something you know very little about.Stacyhttps://www.blogger.com/profile/04582046943770681695noreply@blogger.comtag:blogger.com,1999:blog-3471471289744825428.post-59917963229497296982009-05-19T14:40:46.113-07:002009-05-19T14:40:46.113-07:00Dann,
I was counting on you to chime in and speak...Dann,<br /><br />I was counting on you to chime in and speak up for all the belagured IT folks in the world. You did not dissappoint. Your point is well taken. Network security is only as good as the weakest link, so make sure and get the weak links to bolster security. What I tend to focus on is my personal data, not the network. <br /><br />By the way, I love my IT helpers! Did you all hear that? You are the best!Patrick Emersonhttps://www.blogger.com/profile/17242234148546323374noreply@blogger.comtag:blogger.com,1999:blog-3471471289744825428.post-48378465430923741362009-05-19T14:34:18.797-07:002009-05-19T14:34:18.797-07:00Trust me when I say that the time taken in assisti...Trust me when I say that the time taken in assisting users reseting forgotten (and helping change) passwords far exceeds the time taken fixing the common number of user's hacked accounts. There is a real cost associated with both sides of the security issue - we choose in fact the higher cost, as when the inevitable happens, we can show best practices instead of abject neglect in hopes of mitigating liability (i.e. the Harvard/Yale enrollment debacle a few years back). <br /><br />There is an incentive to hack machines, without going into detail, it creates a free tool to increase market exposure for XYZ. What is XYZ, generally some scam which would be blocked by other means. Pretending to be a colleague is very beneficial. Given the time and effort it takes to hack, this is fairly profitable. <br /><br />Users are commonly lazy on passwords. A little forethought, and your password will be easy to remember, and likely far too complex to ever be hacked. However, that being said, little forethought is ever given. I spend more time than my supervisor cares to know fixing passwords for folks who have substantial value in confidential student or research data that they have spent less than five minutes protecting. Need for security is the oft overlooked eventuality of connectivity. In one building I work in, I need a badge and a FBI background check to walk through the door... but I pickup their wifi network in the parking lot. <br /><br />That being said, recently the university instituted a password change I argued against - well, against how it was implemented. The change was LONG overdue from an IT standpoint, but the University tends to create these unfunded mandates to the departments, expects the departments to staff the issue, and then cut funding. I recently spent over 20 hours on a security issue, and then walked into my review with no sleep to hear my supervisor talk about how (given the cuts in previous 'good' years funding to training, travel) the only think left to cut next year were my and my assistant's staffing levels though we already make <80% of market. (if anyone ever wonders why I will leave the glory of high tech admin for that of a low paid civil DA with tons of law school debt - it looks preferable!)<br /><br />So... change your passwords everyone, and be glad it is so easy. Some admins make them be 15 characters and unable to be repeated in part at all. Use rhythms, use tricks, use whatever is needed. I use the site to guide me... i.e. google sounds like ogle, which then leads me to what men ogle... appending to the end how many of them there usually are. And crap, now I need to go change my password. :-)Dann Cutterhttps://www.blogger.com/profile/08788286445033083370noreply@blogger.comtag:blogger.com,1999:blog-3471471289744825428.post-46619587401238833842009-05-19T11:20:00.000-07:002009-05-19T11:20:00.000-07:00I'm reminded of when I was a public school teacher...I'm reminded of when I was a public school teacher, and the district instituted a policy that teachers had to (1) have sufficiently good passwords with letters and numbers, and (2) change them every 90 days. Well, I had a base that I would then change one number on each time, but most responded by putting a note somewhere with the password.<br /><br />So instead of having to crack a password, all someone (a student, say) had to do to get access to many teachers' grading records was pull out a drawer and copy down a password. Much safer!<br /><br />There are rules that definitely help: making sure people don't use dictionary words, mandating a mix of numbers and letters, maybe making people change them every so often. But I don't believe that making people change passwords every 90 days really helps at all. In fact, it may make things worse.Grayhttps://www.blogger.com/profile/09717600288202429431noreply@blogger.com