Page 430 - Using MIS
P. 430

398       Chapter 10  Information Systems Security

                                    lowercase letters in about 5 minutes. However, brute force requires 8.5 days to crack that length
                                    password having a mixture of upper- and lowercase letters, numbers, and special characters. A
                                    10-digit password of only upper- and lowercase letters takes 4.5 years to crack, but one using a
                                    mix of letters, numbers, and special characters requires nearly 2 million years. A 12-digit, letter-
                                    only password requires 3 million years, and a 12-digit mixed password will take many, many
                                                  5
                                    millions of years.  All of these estimates assume, of course, that the password contains no word
                                    in any language. The bottom line is this: Use long passwords with no words, 10 or more charac-
                                    ters, and a mix of letters, numbers, and special characters.
                                       In addition to using long, complex passwords, you should also use different passwords for
                                    different sites. That way, if one of your passwords is compromised, you do not lose control of all
                                    of your accounts. Make sure you use very strong passwords for important sites (like your bank’s
                                    site), and do not reuse those passwords on less important sites (like your social networking
                                    sites). Some sites are focused on innovating products and may not allocate the same amount
                                    of resources to protect your information. Guard your information with a password it deserves.
        Management sets security       Never send passwords, credit card data, or any other valuable data in email or IM. As stated
        policies to ensure compliance
        with security law, as discussed   numerous times in this text, most email and IM is not protected by encryption (see Q5), and you
        in the Ethics Guide on      should assume that anything you write in email or IM could find its way to the front page of The
        pages 402–403.              New York Times tomorrow.
                                       Buy only from reputable online vendors using a secure https connection. If the vendor does
                                    not support https in its transactions (look for https:// in the address line of your browser), do not
                                    buy from that vendor.
                                       You can reduce your vulnerability to loss by removing high-value assets from your comput-
                                    ers. Now, and especially later as a business professional, make it your practice not to travel out of
                                    your office with a laptop or other device that contains any data that you do not need. In general,
                                    store proprietary data on servers or removable devices that do not travel with you. (Office 365,
                                    by the way, uses https to transfer data to and from SharePoint. You can use it or a similar appli-
                                    cation for processing documents from public locations such as airports while you are traveling.)
                                       Your browser automatically stores a history of your browsing activities and temporary files
                                    that contain sensitive data about where you’ve visited, what you’ve purchased, what your ac-
                                    count names and passwords are, and so forth. It also stores cookies, which are small files that
                                    your browser receives when you visit Web sites. Cookies enable you to access Web sites without
                                    having to sign in every time, and they speed up processing of some sites. Unfortunately, some
                                    cookies also contain sensitive security data. The best safeguard is to remove your browsing his-
                                    tory, temporary files, and cookies from your computer and to set your browser to disable history
                                    and cookies.
                                       CCleaner is a free, open source product that will do a thorough job of securely removing all
                                    such data (http://download.cnet.com/ccleaner/). You should make a backup of your computer
                                    before using CCleaner, however.
                                       Removing and disabling cookies presents an excellent example of the trade-off between
                                    improved security and cost. Your security will be substantially improved, but your computer will
                                    be more difficult to use. You decide, but make a conscious decision; do not let ignorance of the
                                    vulnerability of such data make the decision for you.
                                       We will address the use of antivirus software in Q5. The last three items in Figure 10-7 ap-
                                    ply once you become a business professional. With your coworkers, and especially with those
                                    whom you manage, you should demonstrate a concern and respect for security. You should also
                                    follow all organizational security directives and guidelines. Finally, consider security in all of
                                    your business initiatives.



                                    5 John Pozadzides, “How I’d Hack Your Weak Passwords.” One Man’s Blog, last modified March 26, 2007, http://
                                    onemansblog.com/2007/03/26/how-id-hack-your-weak-passwords/. When Pozadzides wrote this in 2007, it was
                                    for a personal computer. Using 2013 technology, these times would be half or less. Using a cloud-based network
                                    of servers for password cracking would cut these times by 90 percent or more.
   425   426   427   428   429   430   431   432   433   434   435