Men's Wearhouse Has Better Security Than Your School

In the 1992 vice presidential debate, Ross Perot's running mate, Admiral James Stockdale, introduced himself with the words, "Who am I?" For the millions of viewers watching, that was a key question because they had never heard of him or seen him before. His very difficult task was to authenticate himself as a viable candidate to the voting public, a task at which he was ultimately unsuccessful.

The task of authenticating oneself to a computer system is no less daunting. In almost every case, colleges and universities use IDs and passwords. Because passwords must be remembered, most people choose things they already know, such as birth dates, pets' names, and Social Security numbers (SSNs).

Although these are easy to remember, they are also easy to guess or are widely known. The problem is worsened by the fact that people need to authenticate to many systems that do not communicate with each other. This results in people needing to remember many different passwords and IDs.

In the spring of 2002, members of Princeton University's admissions office were able to access the records of prospective Yale students by authenticating to a Yale application with just a Social Security number and birth date. In 2001 and 2002 a business rival of Niku Corp., a small Silicon Valley software company, used passwords that it is alleged were obtained illegally to download more than 1,000 Niku documents, many of which were critical to Niku's competitive survival.

Universities have responded to password threats by making passwords more difficult to break. Users are no longer allowed to use their Social Security numbers. Instead, they are forced to use passwords that obey complex rules that result in passwords such as, "a2$4B!)e," which no one could ever remember but that traditional password cracking programs have difficulty breaking. If an arcane combination of eight characters d'esn't work, universities just require longer passwords such as, "a2$4B!)e{@rucrazy."

Collections of these passwords are usually kept in some unencrypted file named mypasswords or attached to computer screens on Post-it Notes, where they are equally handy for users and intruders. This attempt at improved security results in no security at all.

To deal with multiple passwords, password synchronization programs such as P-Synch (www.psynch.com) and password aggregation systems such as ISO (Initial Sign On), MS Passport (www.passport.net), and Shibboleth (http://shibboleth.internet2.edu/) are used. All of these programs try to make authentication based entirely upon something a person knows work effectively. It can't—and it is time to put this enormous effort into something that will work: biometrics.

Retail Charges Ahead
Like other retail establishments, Men's Wearhouse (www.menswearhouse.com) has electronic Point of Sale (POS) terminals that its sales force logs into to record a transaction or sale.

Men's Wearhouse previously used IDs and passwords. Passwords were hard to remember and were often written down on terminals. Passwords were shared. POS terminals were left logged on for later use, but were often used by the next salesperson.

Of course the sales force was supposed to log on every time, but the systems took time to boot up, errors were made in entering passwords, and the system just slowed them down while they were trying to deal with customers in a hurry. Security was non-existent. When a transaction was missed or a suit couldn't be accounted for, it was impossible to determine who was responsible. This is pretty much the state of university password security today.

Today, Men's Wearhouse has gone to biometrics—using something you are, rather than something you know. You don't have to remember something you are, so you never write it down, and it is more difficult to share something you are. Biometrics also provides positive identification of the person making a transaction. Men's Wearhouse has put fingerprint recognition hardware on all of its POS terminals. Today, a salesperson just touches the terminal and he or she is logged on. No mistyped passwords, shorter delays, and a system that—along with a good security policy—provides strong security and accountability.

At a supermarket you'll always find a harried parent juggling three squirming kids, bags of groceries, and a credit card jammed deep into a wallet. Oops, those cards just fell out. "Adrienne, get back here." "Be careful with those eggs!" "Sorry about you folks waiting in line."

Some Kroger markets (www.kroger.com) now allow shoppers to use credit cards and other physical IDs to authenticate just once to a service center. Their thumbprint is also recorded. Ever after, a customer just touches their thumb to a pad to check out and their credit card is automatically charged. It is very secure, fast, and no one ever sees your credit card.

Critics of biometrics for universities say it isn't perfect. The password mess we have now is worse. Critics say it's too expensive. If the thin margins of a supermarket can support it, of course universities can too. Critics say that the technology is too advanced. Should Kroger markets have better technology than our research universities? It's time to abandon this password mess and adopt biometrics. Then sometime in the future our universities will have security as good as Men's Wearhouse.

Featured

  • The AI Show

    Register for Free to Attend the World's Greatest Show for All Things AI in EDU

    The AI Show @ ASU+GSV, held April 5–7, 2025, at the San Diego Convention Center, is a free event designed to help educators, students, and parents navigate AI's role in education. Featuring hands-on workshops, AI-powered networking, live demos from 125+ EdTech exhibitors, and keynote speakers like Colin Kaepernick and Stevie Van Zandt, the event offers practical insights into AI-driven teaching, learning, and career opportunities. Attendees will gain actionable strategies to integrate AI into classrooms while exploring innovations that promote equity, accessibility, and student success.

  •  floating digital interface with glowing icons, surrounded by faint geometric shapes

    Digital Education Council Defines 5 Dimensions of AI Literacy

    A recent report from the Digital Education Council, a global community devoted to "revolutionizing the world of education and work through technology and collaboration," provides an AI literacy framework to help higher education institutions equip their constituents with foundational AI competencies.

  • computer screen displaying a landline phone being unplugged from a single cord, with a modern office desk, keyboard, and subtle lighting in the background

    Microsoft to Discontinue Skype Services

    Microsoft has announced that it is shutting down service for its Skype telecommunications and video calling services on May 5, 2025.

  • glowing brain, connected circuits, and abstract representations of a book and graduation cap on a light gray gradient background

    Snowflake Launches Program to Upskill 100,000 People in Data and AI

    Cloud data platform Snowflake is embarking on an effort to train and certify more than 100,000 users on its AI Data Cloud by 2027. The One Million Minds + One Platform program will provide Snowflake-delivered courses, training materials, and free access to Snowflake software, at no cost to learners.