Letters

[Editor’s note: The following letter was held over from a previous issue; we apologize for the delay in publishing it.]

Security: A Small Storm Over Gale

Doug Gale’s article on campus security [“It’s Not All About Hackers,” September 2005] had two poor recommendations to improve password security on his “Secure Password Checklist.” His suggestion that users be encouraged or required to change their passwords every 90 days or more is a bad practice leading to a plethora of sticky notes on monitors or scrawled-on business cards in desk drawers, for users find themselves unable to remember their current (and soon-to-be-changed) password. Better to have a good, secure password and guard it vigilantly than to force frequent changes. The second weak recommendation was to “make clear to campus users that they must never give their passwords to anyone other than security administrators or backup personnel.” In fact, no one should give their password to anyone, ever, and we certainly don’t want to introduce the possibility that someone could pose as an administrator in order to gain a password. Security administrators or backup personnel should have, with their authority to administer systems securely, the ability to access those systems appropriately. Passwords are not necessary, i.e., got root? I would think they do.

Molly Tamarkin
Assistant Dean of Information Technology
Nicholas School of the Environment and Earth Sciences
Duke University (NC)

From Doug Gale:

Dean Tamarkin raised excellent points. The first, regarding password changes, is about achieving a balance between theoretical best practice and the real world. It is generally accepted best practice that passwords be changed regularly. The SANS (SysAdmin, Audit, Network, Security) Institute (www.sans.org) recommends that system level passwords be changed at least every 90 days and user passwords every 120 days. (www.sans.org/resources/policies/Password_Policy.pdf). But as Dean Tamarkin points out, forcing periodic password changes that result in weak passwords, reusing passwords or, worse yet, writing passwords down can be counterproductive and actually increase vulnerability in the absence of effective password management solutions. It is also important to differentiate between different users and the kinds of data they access. Access to administrative systems should be more stringent than for students accessing their e-mail. The University of Chicago has, for example, a separate policy for computers containing sensitive data. (https://security. uchicago.edu/regulated-computers/policy.shtml). The university also offers an excellent description of how to select secure and memorable passwords, via the same Web link. Dean Tamarkin’s second point that users should never give up their password is also generally true. Exceptions occur, however, as institutions implement centralized password management strategies, strong encryption becomes more widely used, and institutions respond to state and federal legal requirements. Better phrasing of the item on the Password Checklist would be: “Never give anyone your password except as outlined in institutional policies or as required by applicable state and federal laws.”

Featured

  • Interface buttons of Generative AI tool

    Report: No Foolproof Method Exists for Detecting AI-Generated Media

    Microsoft has released a new research report warning that no single technology can reliably distinguish AI-generated content from authentic media, and that deepening reliance on any one method risks misleading the public.

  • abstract automation workflow

    Druva Adds Agentic Workflows, Deep Analysis Agents to DruAI Platform

    Druva has announced an expansion of its DruAI platform, introducing Deep Analysis Agents and new agentic workflow capabilities aimed at automating complex forensic, compliance, and operational investigations.

  • abstract generative AI technology

    Apple and Google Strike AI Deal to Bring Gemini Models to Siri

    Apple and Google announced they have embarked on a multiyear partnership that will put Google's Gemini models and cloud technology at the core of the next generation of Apple Foundation Models, a move that could help Apple accelerate long-promised upgrades to Siri while handing Google a high-profile distribution win on the iPhone.

  • A panel discussion from SXSW EDU 2025

    12 Ways to Dive into AI at SXSW EDU

    This March 9-12, the SXSW EDU Conference & Festival returns to Austin, TX, to celebrate innovation, experimentation, and learning across every stage of education.