What is the Next Step in the Evolution of the Password?

Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960's when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to allow multiple researchers to have their own personal "profile" when logging in each user was given a login name and password. This allowed each registered user to access the system for their weekly time allotment.

From it's very inception, the password authentication model is inherently flawed. This is due to reasons ranging from the systems they are stored and secured on, as well as the fact that many end users make their passwords easy to remember by default. The latter allows for easy discovery via social engineering, or even finding these "easy passwords" stored on a post-it on the end-user's desk. The former poses other problems.

In current times, passwords are stored as hashed values in a database. The hash, a value which is generated via the cryptographic method chosen by the organization to transform the plain-text data into an unreadable value, is extremely difficult to decrypt. Difficult, but not impossible. More often high-profile organizations are being hacked, and effectively what happens is the attackers obtain a dump of the databases containing the hashes. In turn, the attackers can then spend the time and effort necessary to decrypt the hashes, gaining access to the end-user passwords.

The question stands, how do we avoid this? How can we better secure user data? The answer seems to be moving more and more into the realm of biometrics. From fingerprint readers to voice and full facial recognition these technologies are the forefront of the movement in security. In fact, these technologies are finally moving out of their infancy due to their own inherent insecurities.

Basic fingerprint scans can be faked relatively easily. An episode of Myth Busters showed how a fingerprint scanner on a door can be fooled with a photocopy. Facial recognition on mobile devices have been circumvented with a photograph. Voice recognition can be fooled with a good-quality recording. As such, the companies that produce these security measures have expanded their scope. Something as simple as adding aspects like touch pressure sensitivity to fingerprint scans, or tracking slight facial movements like blinking to facial recognition can increase security tenfold.

Even further, security firms are working on authentication methods that combine various biometric aspects to form more secure, encompassing multi-factor authentication for services and devices. As this segment of the security industry grows the future of the password is not very bright, but it will be quite some time before the password is finally dead.

Battle of the email solutions: exchange vs. google apps

In the industry I am in, with the job functions I perform daily, I see more and more organizations moving from an in-house email solution such as Exchange to cloud-based email solutions like Office 365 and Google Apps. This is due to many reasons and an easy way to see why is to compare Exchange and Google Apps.

Read more

Category

Identity en Access Management

automated account management, cloud based email solutions, Compage Exchange and Google Apps, compare cloud based email solution, compare email solutions, Exchange, Google Apps

How to manage credentials the easy way

A seemingly simple, yet tedious task for anyone in the information technology field is credential management. End users are given usernames and passwords for various systems in an organizations environment, and the hope is that the end users can manage these credentials with very little issue or assistance.

Read more

Account Management in Education: How Can It Be Improved?

Many school districts and even some higher-learning institutions have their technological infrastructure run by a skeleton crew due to things such as politics and budgetary constraints. Situations such as this can often lead to many issues within the organization: Lack of network resources for end users Inability to properly support end users and systems No time to research and implement newer technology This causes frustrated overworked admins to think outside the box and turn to other solutions, such as software-based, automated or semi-automated identity management.

Read more

Group Policy Object; What is it and how can it allow for seamless deployment of software

In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings on local stations, are just some of the items an administrator wants to manage centrally and cohesively. A common method to manage domain resources like this is via Group Policy in Active Directory.

Read more

Advanced Authentication Methods

In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape our technological landscape are moving quickly, and those who see fit to exploit the weaknesses inherent in such a landscape are just one-step behind -or sometimes, they may be one-step ahead.

Read more