Context
Real life attacks confirm that accessing somebody else's account by using a secondary account, calling a customer service center or answering a security question is often much easier and less time consuming than cracking the actual account's password.