Summary of What’s Wrong with Your Password?

Looking for the video?
We have the summary! Get the key insights in just 5 minutes.

What’s Wrong with Your Password? summary
Start getting smarter:
or see our plans

Rating

9 Overall

10 Applicability

9 Innovation

7 Style


Recommendation

The password-generation protocols that websites employ are becoming increasingly sophisticated, but there is little data to verify the best rubric in creating passwords. To fill this gap, online security expert Lorrie Faith Cranor amassed data, analyzed common conventions and developed some best practices for password creation. getAbstract suggests you watch Cranor’s talk before you type “12345678” the next time a website instructs you to insert a password.

In this summary, you will learn

  • Why many password policies are baseless,
  • What several studies revealed about password strength and
  • How can you create stronger passwords.
 

About the Speaker

Online security expert Lorrie Faith Cranor is a co-founder of Wombat Security Technologies and an associate professor of computer science and of engineering and public policy at Carnegie Mellon University.

 

Summary

Remembering your passwords for your many online accounts can be frustrating, especially when some sites have stringent password policies. For example, Carnegie Mellon University (CMU) requires users to create complex passwords that must contain a minimum of eight characters – including at least one uppercase letter, lowercase letter, digit and symbol – without using the same character more than three times. CMU’s security policy adheres to guidelines for creating passwords with strong “entropy” – a measure of password strength – although these commonly accepted standards are unsupported by research.


More on this topic

Customers who read this summary also read

How to Encrypt Your Entire Life in Less than an Hour
How to Encrypt Your Entire Life in Less than an Hour
8
How to Withstand a Cyberattack
How to Withstand a Cyberattack
8
How (and Why) Russia Hacked the US Election
How (and Why) Russia Hacked the US Election
8
Virtual Billions
Virtual Billions
8
The Malicious Use of Artificial Intelligence
The Malicious Use of Artificial Intelligence
8
Only Humans Need Apply
Only Humans Need Apply
8

Related Channels

Comment on this summary