SUPPORT THE WORK

GetWiki

security question

ARTICLE SUBJECTS
aesthetics  →
being  →
complexity  →
database  →
enterprise  →
ethics  →
fiction  →
history  →
internet  →
knowledge  →
language  →
licensing  →
linux  →
logic  →
method  →
news  →
perception  →
philosophy  →
policy  →
purpose  →
religion  →
science  →
sociology  →
software  →
truth  →
unix  →
wiki  →
ARTICLE TYPES
essay  →
feed  →
help  →
system  →
wiki  →
ARTICLE ORIGINS
critical  →
discussion  →
forked  →
imported  →
original  →
security question
[ temporary import ]
please note:
- the content below is remote from Wikipedia
- it has been imported raw for GetWiki
{{Short description|Question used to control access}}A security question is form of shared secretWEB,weblink In What City Did You Honeymoon? And other monstrously stupid bank security questions, Josh, Levin, Slate, 2008-01-30, used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra security layer.

History

Financial institutions have used questions to authenticate customers since at least the early 20th century. In a 1906 speech at a meeting of a section of the American Bankers Association, Baltimore banker William M. Hayden described his institution's use of security questions as a supplement to customer signature records. He described the signature cards used in opening new accounts, which had spaces for the customer's birthplace, "residence," mother's maiden name, occupation and age.Hayden noted that some of these items were often left blank and that the "residence" information was used primarily to contact the customer, but the mother's maiden name was useful as a "strong test of identity." Although he observed that it was rare for someone outside the customer's family to try to withdraw money from a customer account, he said that the mother's maiden name was useful in verification because it was rarely known outside the family and that even the people opening accounts were "often unprepared for this question."William M. Hayden (1906), Systems in Savings Banks, The Banking Law Journal, volume 23, page 909. Similarly, under modern practice, a credit card provider could request a customer's mother's maiden name before issuing a replacement for a lost card.In the 2000s, security questions came into widespread use on the Internet. As a form of self-service password reset, security questions have reduced information technology help desk costs. By allowing the use of security questions online, they are rendered vulnerable to keystroke logging and brute-force guessing attacks,BOOK, Bonneau, Joseph, Bursztein, Elie, Caron, Ilan, Jackson, Rob, Williamson, Mike, Proceedings of the 24th International Conference on World Wide Web, Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google, 2015-05-18, en, Florence Italy, International World Wide Web Conferences Steering Committee, 141–150, 10.1145/2736277.2741691, 978-1-4503-3469-3, free, as well as phishing.WEB, 2021-05-30, Facebook users unwittingly partake in viral password hint scam by 'playing question games',weblink 2021-07-17, Your Content, en-US, In addition, whereas a human customer service representative may be able to cope with inexact security answers appropriately, computers are less adept. As such, users must remember the exact spelling and sometimes even case of the answers they provide, which poses the threat that more answers will be written down, exposing them to physical theft.

Application

{{Cleanup tone|date=February 2024}}Due to the commonplace nature of social-media, many of the older traditional security questions are no longer useful or secure. It is important to remember that a security question is just another password. Therefore, a security question should not be shared with anyone else, or include any information readily available on social media websites, while remaining simple, memorable, difficult to guess, and constant over time. Understanding that not every question will work for everyone, RSA (a U.S. network security provider, a division of EMC Corporation) gives banks 150 questions to choose from.Many have questioned the usefulness of security questions.Robert Lemnos, Are Your "Secret Questions" Too Easily Answered?, MIT Technology Review, May 18, 2009 (retrieved 21 May 2015)Victor Luckerson, Stop Using This Painfully Obvious Answer For Your Security Questions, Time Magazine, 21 May 2015 (retrieved 21 May 2015) Elie Bursztein, New Research: Some Tough Questions for ‘Security Questions’, 24th International World Wide Web Conference (WWW 2015), Florence, Italy, May 18 - 22, 2015; Google Online Security Blog, 21 May 2015 (retrieved 21 May 2015) Security specialist Bruce Schneier points out that since they are public facts about a person, they are easier to guess for hackers than passwords. Users that know this create fake answers to the questions, then forget the answers, thus defeating the purpose and creating an inconvenience not worth the investment.WEB,weblink The Curse of the Security Question, Bruce Schneier,

See also

References

{{reflist}}

- content above as imported from Wikipedia
- "security question" does not exist on GetWiki (yet)
- time: 5:05am EDT - Sat, May 18 2024
[ this remote article is provided by Wikipedia ]
LATEST EDITS [ see all ]
GETWIKI 23 MAY 2022
GETWIKI 09 JUL 2019
Eastern Philosophy
History of Philosophy
GETWIKI 09 MAY 2016
GETWIKI 18 OCT 2015
M.R.M. Parrott
Biographies
GETWIKI 20 AUG 2014
CONNECT