You probably have accounts on many different websites. It’s a bad habit to use the same password for each of them because if any of those sites has a security breach, the hackers will learn the password to all of your other accounts.
The hacks of several online services have brought this issue to light once again.
I’m sorry, but a single strong password just isn’t enough anymore. You must use different strong passwords on every site where you have an account – at least, every important site.
And yes, you must devise a way to manage them all.
The all-too-common scenario
The scenario I’m about to describe is very common. While the specifics won’t apply to you exactly, it’ll conceptually illustrate what can happen.
Let’s say you have an account at some online service – I’ll call it Service A. In addition, you have a Yahoo! account because you use Flickr, a Google account because you use mail and a number of other Google services, a Microsoft account because you have Windows, and we’ll throw in a Dropbox account because you’ve been listening to me recommend it. You probably have other accounts I haven’t listed here, but you get the idea. You have lots of accounts to a number of online services.
You have a wonderfully strong password: 14 completely random characters that you’ve memorized.
And you use that same wonderfully strong password everywhere.
Here’s how it can go horribly, horribly wrong.
Anatomy of a hack
Service A has the best of intentions, but honestly, they don’t “get” security. Perhaps they store passwords in their database in plain text, allowing anyone with access to see them. They do that because it’s easy, it’s fast, and it allows them to solve the problem quickly. They make the assumption that the database containing your password will be impenetrable.
Hackers love it when site designers make assumptions like that because, of course, the assumption is false.
One day, a hacker breaches site security and steals a copy of the customer/user database. The hacker walks away with a database that contains the following information for every user:
They can log in to your account on Service A. That may or may not be a big deal, depending on exactly what Service A is and how you use it.
But it opens a very dangerous door.
It doesn’t have to be a hack
It’s important to understand that while this example centers around what we hear about in the news most often – the hack of an online service and the theft of their user database – it’s certainly not limited to that.
Essentially, anything that could compromise your password brings you to this point. That includes:
And so on.
Anything that puts your single password into the hands of a malicious individual puts you at greater risk than you might assume.
You probably have accounts on many different websites. It’s a bad habit to use the same...
You have a customer who has installed an FTP client on her Windows XP computer and wants to use it to update a number of Websites she administers. She says she has a good Internet connection and is able to surf the Web and send and receive e-mails, but she can’t get her FTP client to connect to any of the required Websites. She has verified that her username and password for those sites is good, and she can ping...
Many biomolecules contain the same atoms bonded to the same atoms so they have the same molecular formula. Enantiomers are isomers of this type that are mirror images of each other and cannot be superimposed on each other. All properties of enantiorners are identical except they rotate the plane of polarized light in opposite directions and a. they react differently with non-chiral compounds b. they have different specific gravities c. an enzyme that binds one of the enantiomers won't be...
Alice wants to evaluate a picture-based password system. The system has a database of 100 different pictures. To select a password, the user is allowed to browse through the database of pictures and select 20 pictures as their password. To authenticate, the user is presented with 20 challenges. Each challenge consists of 2 pictures displayed to the user: one is randomly chosen from the user's password set, and the other is randomly chosen from the remaining 80 pictures. The user...
Accounts Receivable Exercise What you will learn more about: Bad Debt Allowance for Bad Debt Allowance Method or Balance Sheet Approach Income Statement Approach Accounts Receivable Turnover Average Collection Period Dr. I. Ball, an Optometrist asks you to take a look at his accounts receivable situation for the year. He provides you the following information as of December 31: Accounts Receivable Accounts: Not yet due $43.270 1-30 days overdue 27.100 31-60 days overdue 14,800 More than 60 days overdue 9,700...
1. how many different brackets you would have to pick in order to guarantee yourself getting all the points Helpful Information: Games Name of Round Each Correct Pick (4 teams play to get into 32 First Round 1 Point the main bracket. Those 16 Second Round 2 Points games don’t count and 8 Sweet 16 3 Points the scoring begins with 4 Elite 8 8 Points the 64 team bracket) 2 Final 4 20 Points 1 Championship Game ...
You are the personnel manager of ‘ AllCure Pharmaceuticals’. It’s a busy time and the guys in the product approval department have called you up because they desperately need to hire a new team member to assist them with the clinical tests of what could become the next blockbuster drug for the company. You get to work and within a week have actually managed to get three well-qualified applicants for the job. The interviews went well and there are two...
You have been given a project that requires integration of many different technologies, including the physical transmission medium, switching, routing, security, and telephony. Finding resources to learn about each technology and its products is usually not a problem. A Web search will usually provide an excellent starting point. However, finding resources that address your unique project requirements and mix of technologies will be a challenge. Discuss how you will find and then pull together all of the resources needed for...
Measurements of some property x all have the same uncertainty sx. You use these measurements to determine another property y, where y Aex. Does any y value have the same uncertainty as all the other y values (like those of x)? Support your answer
Part I You are working on the valuation of accounts receivable, and bad debt reserves for the current year's annual report. The CFO stops by and asks you to reduce the reserve by enough to increase the current year's EPS by 2 cents a share. The company's policy has always been to use the previous year's actual bad debt percentage adjusted for a specific economic index. The CFO's suggested change would still be within acceptable GAAP. However, later, you learn...
4. Mutations in the CX26 gene are a common cause of deafness. (You probably know some people at RIT who are deaf due to CX26 mutations.) CX26 codes for a gap junction protein expressed in the cochlea (inner ear); this protein forms a connection between cells and allows ions to pass between them Mutation 35delG is the most common cause of simple, genetic deafness in Caucasians, with a carrier rate of 1 in 35. If 1 in 5000 children in...