SKIP TO CONTENT

Computer passwords Speak, friend, and enter

http://www.economist.com/node/21550763
32 words 5 learners

Learn words with Flashcards and other activities

Full list of words from this list:

  1. ubiquitous
    being present everywhere at once
    PASSWORDS are ubiquitous in computer security.
  2. ineffective
    not producing an intended consequence
    All too often, they are also ineffective.
  3. practice
    translating an idea into action
    A good password has to be both easy to remember and hard to guess, but in practice people seem to plump for the former over the latter.
  4. latter
    the second of two or the second mentioned of two
    A good password has to be both easy to remember and hard to guess, but in practice people seem to plump for the former over the latter.
  5. extreme
    of the greatest possible degree, extent, or intensity
    Some take simplicity to extremes: one former deputy editor of The Economist used “z” for many years.
  6. emerge
    come out into view, as from concealment
    And when hackers stole 32m passwords from a social-gaming website called RockYou, it emerged that 1.1% of the site’s users—365,000 people—had opted either for “123456” or for “12345”.
  7. predictability
    the capacity to be known or expected in advance
    That predictability lets security researchers (and hackers) create dictionaries which list common passwords, a boon to those seeking to break in.
  8. boon
    something that is desirable, favorable, or beneficial
    That predictability lets security researchers (and hackers) create dictionaries which list common passwords, a boon to those seeking to break in.
  9. ethical
    conforming to accepted standards of social behavior
    Hacked websites such as RockYou have provided longer lists, but there are ethical problems with using hacked information, and its availability is unpredictable.
  10. auspices
    kindly endorsement and guidance
    However, a paper to be presented at a security conference held under the auspices of the Institute of Electrical and Electronics Engineers, a New York-based professional body, in May, sheds some light.
  11. demographic
    a statistic characterizing human populations
    With the co-operation of Yahoo!, a large internet company, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70m passwords that, though anonymised, came with useful demographic data about their owners.
  12. intriguing
    capable of arousing interest or curiosity
    Mr Bonneau found some intriguing variations.
  13. generic
    relating to or applicable to an entire class or group
    For, despite their differences, the 70m users were still predictable enough that a generic password dictionary was effective against both the entire sample and any demographically organised slice of it.
  14. blunt
    not sharp (used of a knife or other blade)
    Mr Bonneau is blunt: “An attacker who can manage ten guesses per account…will compromise around 1% of accounts.”
  15. compromise
    an accommodation in which both sides make concessions
    Mr Bonneau is blunt: “An attacker who can manage ten guesses per account…will compromise around 1% of accounts.”
  16. worthwhile
    sufficiently valuable to justify the investment of time
    And that, from the hacker’s point of view, is a worthwhile outcome.
  17. obscure
    not clearly understood or expressed
    How this state of affairs arose is obscure.
  18. impose
    charge and collect payment
    But password laxity imposes costs even on sites with good security, since people often use the same password for several different places.
  19. remnant
    a small part remaining after the main part no longer exists
    One suggestion is that lax password security is a cultural remnant of the internet’s innocent youth—an academic research network has few reasons to worry about hackers.
  20. implement
    a piece of equipment or a tool used for a specific purpose
    Another possibility is that because many sites begin as cash-strapped start-ups, for which implementing extra password security would take up valuable programming time, they skimp on it at the beginning and then never bother to change.
  21. skimp
    work hastily or carelessly
    Another possibility is that because many sites begin as cash-strapped start-ups, for which implementing extra password security would take up valuable programming time, they skimp on it at the beginning and then never bother to change.
  22. random
    lacking any definite plan or order or purpose
    So they compared their collection of passphrases with two-word phrases extracted at random from the British National Corpus (a 100m-word sample of English maintained by Oxford University Press), and from the Google NGram Corpus (harvested from the internet by that firm’s web-crawlers).
  23. corpus
    a collection of writings
    So they compared their collection of passphrases with two-word phrases extracted at random from the British National Corpus (a 100m-word sample of English maintained by Oxford University Press), and from the Google NGram Corpus (harvested from the internet by that firm’s web-crawlers).
  24. so-called
    doubtful or suspect
    One way round that is to combine the ideas of a password and a passphrase into a so-called mnemonic password.
  25. mnemonic
    of or relating to the practice of aiding the memory
    One way round that is to combine the ideas of a password and a passphrase into a so-called mnemonic password.
  26. gibberish
    unintelligible talking
    This is a string of apparent gibberish which is not actually too hard to remember.
  27. contraction
    the act of decreasing in size or volume or quantity or scope
    It can be formed, for example, by using the first letter of each word in a phrase, varying upper and lower case, and substituting some symbols for others—“8” for “B”, for instance. (“itaMc0Ttit8” is thus a mnemonic contraction of the text in these brackets.)
  28. invulnerable
    immune to attack; impregnable
    Even mnemonic passwords, however, are not invulnerable.
  29. lyric
    of or relating to poetry that expresses emotion
    A study published in 2006 cracked 4% of the mnemonics in a sample using a dictionary based on song lyrics, film titles and the like.
  30. upshot
    a phenomenon that is caused by some previous phenomenon
    The upshot is that there is probably no right answer.
  31. irritate
    cause annoyance in
    All security is irritating (ask anyone who flies regularly), and there is a constant tension between people’s desire to be safe and their desire for things to be simple.
  32. persist
    refuse to stop
    While that tension persists, the hacker will always get through.
Created on Thu May 10 12:57:24 EDT 2012 (updated Thu May 10 13:23:19 EDT 2012)

Sign up now (it’s free!)

Whether you’re a teacher or a learner, Vocabulary.com can put you or your class on the path to systematic vocabulary improvement.