Don’t Give Up Your Passwords

Keep the Keys Safe
  • Daniel G. Bachrach
  • Eric J. Rzeszut


Jackie, a newly hired HR database administrator (DBA) at a major state university, has several years’ professional experience working with big data. In her first week Jackie is “on-boarded” into the position. She is immediately granted full access to a large number of university systems and databases, which have disparate password and access requirements. Because of an absence of coherence across departments and university subunits (which is typical of large organizations), Jackie has to learn several new logon procedures for these assets. Some of the more sensitive systems at the university depend on “two-factor” authentication, requiring Jackie to use a physical identity (sometimes called an authentication or cryptographic) token in combination with a password.


Security Protocol Brute Force Attack Data Breach Breach Investigation Password Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Daniel G. Bachrach 2014

Authors and Affiliations

  • Daniel G. Bachrach
    • 1
  • Eric J. Rzeszut
    • 1
  1. 1.ALUnited States

Personalised recommendations