53,194 research outputs found

    Risk analysis on password for web authentication

    Get PDF
    Web authentication nowadays very heavily depends on password.From online banking to email account access, the password has played an important role in authenticating users to the designated system.In controlling access to a system, trade-offs are made between security and convenience.If a resource is protected by a password, usually the security is increased and user will always found to be inconvenience to use the system.This research addresses the important of choosing the password for any designated systems by evaluating the risk of choosing the password.Three password schemes were analyze in order to find the best scheme for the system administrator to provide suitable advice to their users.The outcome of the research will hopefully guide users to choose a strong and reliable password for web access

    Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study

    Full text link
    Passwords are still a mainstay of various security systems, as well as the cause of many usability issues. For end-users, many of these issues have been studied extensively, highlighting problems and informing design decisions for better policies and motivating research into alternatives. However, end-users are not the only ones who have usability problems with passwords! Developers who are tasked with writing the code by which passwords are stored must do so securely. Yet history has shown that this complex task often fails due to human error with catastrophic results. While an end-user who selects a bad password can have dire consequences, the consequences of a developer who forgets to hash and salt a password database can lead to far larger problems. In this paper we present a first qualitative usability study with 20 computer science students to discover how developers deal with password storage and to inform research into aiding developers in the creation of secure password systems

    Evaluation of the KA24 (Knowledge Access 24) service for health- and social-care staff in London and the south-east of England. Part 2: qualitative

    Get PDF
    AIMS AND OBJECTIVES: The aim of this two-part paper is to identify the main transferable lessons learned from both the quantitative and qualitative evaluations of the KA24 (Knowledge Access 24) service of online databases and selected full text journals for health and social care staff in London and the South-East of England. The objectives of the qualitative evaluation were to assess the enablers and barriers to usage, and to assess the impact of the service on patient care. METHODS: Telephone interviews (n=65) and a questionnaire survey (n=296) were conducted with various types of user, in various Trust settings. Some non-users were also contacted. Selection of interviewees and questionnaire recipients was not random, and aimed to cover all groups of users representatively. RESULTS: Results show that policy goals were being delivered, with indications of changes to clinical practice, and improved clinical governance. Promotion, training and support needs to be extensive, and tailored to needs, but users are not always aware they need training. The sharing of passwords cast doubts on the reliability of some usage data. CONCLUSIONS: Digital health library services, delivered at the point of care, are changing the way some clinicians practise. A combination of qualitative and quantitative evaluation methods are needed to assess digital library services

    ā€œThis is the way ā€˜Iā€™ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?

    Get PDF
    The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines

    Security awareness and affective feedback:categorical behaviour vs. reported behaviour

    Get PDF
    A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship between end-user-security behaviour, and the use of affective feedback to educate end-users. Part of the aforementioned research project considers the link between categorical information users reveal about themselves online, and the information users believe, or report that they have revealed online. The experimental results confirm a disparity between information revealed, and what users think they have revealed, highlighting a deficit in security awareness. Results gained in relation to the affective feedback delivered are mixed, indicating limited short-term impact. Future work seeks to perform a long-term study, with the view that positive behavioural changes may be reflected in the results as end-users become more knowledgeable about security awareness

    Reducing risky security behaviours:utilising affective feedback to educate users

    Get PDF
    Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rate of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness

    POINTER:a GDPR-compliant framework for human pentesting (for SMEs)

    Get PDF
    Penetration tests have become a valuable tool in any organisationā€™s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also ā€œpenetration testā€ their employees, assessing their resilience and ability to repel human-targeted attacks. There are two problems with current frameworks: (1) few of these have been developed with SMEs in mind, and (2) many deploy spear phishing, thereby invading employee privacy, which could be illegal under the new European General Data Protection Regulation (GDPR) legislation. We therefore propose the PoinTER (Prepare TEst Remediate) Human Pentesting Framework. We subjected this framework to expert review and present it to open a discourse on the issue of formulating a GDPR- compliant Privacy-Respecting Employee Pentest for SMEs

    Exploring the Impact of Password Dataset Distribution on Guessing

    Full text link
    Leaks from password datasets are a regular occurrence. An organization may defend a leak with reassurances that just a small subset of passwords were taken. In this paper we show that the leak of a relatively small number of text-based passwords from an organizations' stored dataset can lead to a further large collection of users being compromised. Taking a sample of passwords from a given dataset of passwords we exploit the knowledge we gain of the distribution to guess other samples from the same dataset. We show theoretically and empirically that the distribution of passwords in the sample follows the same distribution as the passwords in the whole dataset. We propose a function that measures the ability of one distribution to estimate another. Leveraging this we show that a sample of passwords leaked from a given dataset, will compromise the remaining passwords in that dataset better than a sample leaked from another source
    • ā€¦
    corecore