PASSWORD PROTECTION: END USER SECURITY BEHAVIOR

Authors

  • Keisuke Kato
  • Vitaly Klyuev

DOI:

https://doi.org/10.47839/ijc.13.1.616

Keywords:

Security, Password Protection, User Study, Survey, Tendency.

Abstract

Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, etc., if passwords leak out. Thus, we have to understand clearly what is important for creating and/or changing passwords. Our goal is to analyze key issues for setting passwords. We surveyed 262 students of the University of Aizu, Japan. We discussed key security problems, main password protection issues and techniques, and misunderstandings about passwords by end users. Furthermore, we compared the obtained data with results provided by the National Institute of Standard Technology (NIST) and others. The results can help the users set stronger passwords.

References

Google 2-step verification, http://www.google.com/landing/2step/

Introducing Login Approvals on Facebook, https://www.facebook.com/note.php?note_id=10150172618258920

R. Anderson, Security Engineering: A Guide to Building Depend- able Distributed System, Second Edition, Wiley Publishing, 2008.

Keisuke Kato, Vitaly Klyuev, Strong passwords: practical issues, Proceedings of the 7th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2013), Berlin, Germany (September 12-14, 2013), pp. 608-613.

I. Korkmaz and M. E. Dalkilic, The weak and the strong password preferences: a case study on Turkish users, Proceedings of the 3rd International Conference on Security of Information and Networks SIN’10, pp. 56-61, 2010.

A. Narayanan and V. Shmatikov, Fast dictionary attacks on password using time-space tradeoff, Proceedings of the 12th ACM Conference on Computer and Communications Security CCS’05, 2005, pp. 364–372.

John the ripper, http://www.openwall.com/john/

Hashcat, http://hashcat.net/oclhashcat-plus/

Does adding one more question impact survey completion rate? https://www.surveymonkey.com/blog/en/blog/2010/12/08/survey_questions_and_completion_rates

R. Shay, P. G. Kelley, S. Komanduri, P. G. Leon, M. L. Mazurek, L. Bauer, N. Christin, and L. F. Cranor, Encountering stronger password requirements: user attitudes and behaviors, Proceedings of the 6th Symposium on Usable Privacy and Security, 2010.

Ashwini Rao, Birendra Jha, and Gananand Kini, Effect of grammar on security of long passwords”, Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy CODASPY’13, 2013, pp. 317–324.

M. Dell’Amico, P. Michiardi, and Yves Roudier, Password Strength: An Empirical Analysis, Proceedings of the IEEE International Conference on Computer Communications, 2010, pp. 1–9.

D. Hart, Attitudes and practices of students towards password security, Journal of Computing Sciences in Colleges, (23) 5 (2008), pp. 169–174.

F. Bergadano, B. Crispo and G. Ruffo, Proactive password checking with decision trees, Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 67–77.

P. Y. Logan and A. Clarkson, So long, and no thanks for the externalities: the rational rejection of security advice by users”, Proceedings of the New Security Paradigms Workshop NSPW’09, 2009, pp. 133–144.

C. Herley, Teaching students to hack: curriculum issues in information security, Proceedings of the 36th Technical Symposium on Computer Science Education SIGCSE’05, 2005, pp. 157–161.

The maximum time required to analyze password by characters and/or the number of characters in use, http://www.ipa.go.jp/security/english/virus/press/200809/E PR200809.html/

How I’d hack your weak passwords, http://lifehacker.com/5505400/how-id-hack-your-weak-passwords

Password recovery speeds, http://www.lockdown.co.uk/?pg=combi&s=articles

W. E. Burr, D. F. Dodson, and W. T. Polk. Electronic Authentication Guideline, Technical report, National Institute of Standards and Technology, 2006.

Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, and Cormac Herley, Does my password go up to eleven? The impact of password meters on password selection, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI’13, pp. 2379-2388.

D. Florencio, and C. Herley. A large-scale study of web password habits, Proceedings of the 16th International Conference on the World Wide Web, ACM Press (New York, NY, USA, 2007), 657–666.

C. E. Shannon, A mathematical theory of communication, ACM SIGMOBILE Mobile Computing and Communications Review, (5) 1 (1948).

J. L. Massey, Guessing and entropy, Proceedings of the IEEE International Symposium on Information Theory, 1994, 204.

http://www.passwordmeter.com

Recognition and acceptance of security and privacy for eID, Technical Report: (The original title is in Japanese, Copyright © IPA, Japan), http://www.ipa.go.jp/security/economics/report/eid201008.html

Young people and emerging digital services an exploratory survey on motivations, perceptions and acceptance of risks, http://ftp.jrc.es/EURdoc/JRC50089.pdf

Downloads

Published

2014-08-01

How to Cite

Kato, K., & Klyuev, V. (2014). PASSWORD PROTECTION: END USER SECURITY BEHAVIOR. International Journal of Computing, 13(1), 8-16. https://doi.org/10.47839/ijc.13.1.616

Issue

Section

Articles