Search Details

Word: pinned (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

They needn’t be that way. The PIN authentication system, utilized by the College’s Registrar and Harvard College Libraries, to name a few, is the standard at Harvard for restricting access to privileged information. With such an effective system already in place—one that requires an ID number and a privately-held PIN password—it’s a wonder UHS didn’t feel the need to jump on the PIN bandwagon...

Author: By The Crimson Staff, | Title: One Scary Glitch | 2/3/2005 | See Source »

...Crimson report, Harvard will conduct an audit of all websites that permit access with the ID and another nonsecure piece of information—which Wrinn called “an inappropriately weak form of authentication”—rather than through a confidential password or PIN number...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Harvard To Review Site Access Standards | 1/24/2005 | See Source »

...Securing access to restricted web sites or other applications with anything other than HUID and PIN is not appropriate,” Wrinn wrote in an e-mail. “Whether a site contains confidential data or not, the login process should entail a secret password that is under the control of the user...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Harvard To Review Site Access Standards | 1/24/2005 | See Source »

Though most Harvard websites with secure information require a confidential PIN or other password in addition to the ID, The Crimson has identified a number of online applications—ranging from PharmaCare to network access to mail forwarding—that require nothing more than an ID number and birthday, or ID and last name...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

...It’s too bad that everything hasn’t been shifted over to PIN authentication, which should today represent the minimum of security for confidential university records,” Lewis added...

Author: By J. hale Russell and Elisabeth S. Theodore, CRIMSON STAFF WRITERSS | Title: Drug Records, Confidential Data Vulnerable | 1/21/2005 | See Source »

Previous | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | Next