Skip to main content
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
    • Speaker Resources
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
    • Workshop Program
    • Conference Topics
    • Co-Located Events
      • URES '14 West
      • SESA '14
      • Puppet Camp Seattle
      • LISA Data Storage Day
      • CentOS Dojo Seattle
    • Activities
      • LISA Build
      • LISA Lab
      • Birds-of-a-Feather Sessions
      • Poster Session
      • LISA14 Expo
  • Sponsors and Expo
    • LISA14 Expo
    • Sponsors/Exhibitors List
    • Exhibitor Services
    • Download Prospectus (PDF)
  • About
    • Conference Organizers
    • Past Conferences
    • Services
    • Contact Us
    • Code of Conduct
    • Original Call for Participation
    • Help Promote

  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

"LISA is the place where industry best practices and cutting-edge research come together to advance system administration."

Nicole Forsgren Velasquez, Utah State University

"LISA is where professionals share what's hot in designing, building, and maintaining critical systems."

Tom Limoncelli, author, speaker, and system administrator

"I keep coming back for the technical content and the personal networking opportunities. I attend for career development."

LISA '13 Attendee

"LISA is where I find direction for evolving the my core professional skills."

LISA '13 Attendee

"I use LISA to benchmark the SA activities in my company."

LISA '13 Attendee

"LISA is the conference that I send my system administrators to so they can bring the latest tools and techniques back to the rest of the team. Much of our current environment can be traced directly back to LISA."

Cory Lueninghoener, Deputy Group Leader of Production High Performance Computing at Los Alamos National Laboratory

"Information from LISA helps us push the envelope on automation and scaling, allowing a team of four to manage over 3000 Firefox build and test systems running 15 different operating systems."

Amy Rich, Manager of Release Engineering Operations at Mozilla

"LISA is where professionals share what's hot in designing, building, and maintaining critical systems."

Tom Limoncelli, author, speaker, and system administrator

"LISA is the conference that I send my system administrators to so they can bring the latest tools and techniques back to the rest of the team. Much of our current environment can be traced directly back to LISA."

Cory Lueninghoener, Deputy Group Leader of Production High Performance Computing at Los Alamos National Laboratory

LISA16 CFP button

Get more
Help Promote graphics!

Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy
Tweet

connect with us

Keep it Simple, Stupid: Why the Usual Password Policies Don't Work, and What to Do About It

LISA: Where systems engineering and operations professionals share real-world knowledge about designing, building, and maintaining the critical systems of our interconnected world.

The LISA conference has long served as the annual vendor-neutral meeting place for the wider system administration community. The LISA14 program recognized the overlap and differences between traditional and modern IT operations and engineering, and developed a highly-curated program around 5 key topics: Systems Engineering, Security, Culture, DevOps, and Monitoring/Metrics. The program included 22 half- and full-day training sessions; 10 workshops; and a conference program consisting of 50 invited talks, panels, refereed paper presentations, and mini-tutorials.

Invited Talk
Friday, November 14, 2014 - 11:00am-11:45am

Abe Singer, Laser Interferometer Gravitational Wave Observatory, Caltech, and Warren Anderson, University of Wisconsin, Milwaukee

Abstract: 

Common password policies don’t really work; they’re annoying and users still end up with bad passwords. How does one devise a password policy that both manages risk yet remains usable by its users? We present the fundamental problem with common password policies, and how we approached a solution, looking at the effectiveness of password strength rules in combination with human factors. Our result gives us measurable strength and improves usability, without password aging.

The talk will look at the history of password policies, a formal view of password attacks, the usability issues of passwords, and our experiences with our solution.

Abe Singer, Laser Interferometer Gravitational Wave Observatory, Caltech

Abe Singer is the Chief Security Officer for the Laser Interferometer Gravitational Wave Observatory and the LIGO Scientific Collaboration, and formerly the Chief Security Officer of the San Diego Supercomputer Center. At times he has been a programmer, system administrator, security geek, consultant, and expert witness. He is based at the California Institute of Technology in Pasadena.

Warren Anderson, University of Wisconsin, Milwaukee

Warren Anderson is a Visit­ing Assistant Professor in the Department of Physics at the University of Wisconsin–Milwaukee and a member of the LIGO Scientific Collaboration, and is effectively the project manager for the LIGO Identity and Access Management Infrastructure. His publications are primarily on black holes and gravitational waves; he has just begun his foray into the world of computer security.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@conference {209027,
author = {Abe Singer and Warren Anderson},
title = {Keep it Simple, Stupid: Why the Usual Password Policies Don{\textquoteright}t Work, and What to Do About It},
year = {2014},
address = {Seattle, WA},
publisher = {USENIX Association},
month = nov
}
Download

Presentation Video 

Presentation Audio

MP3 Download

Download Audio

  • Log in or register to post comments

© USENIX
EIN 13-3055038

  • Privacy Policy
  • Contact Us

LISA is a registered trademark of the USENIX Association.