scispace - formally typeset
Proceedings ArticleDOI

Password Security: What Are We Doing Wrong?

Donald K. Davis, +2 more
- pp 562-567
Reads0
Chats0
TLDR
This paper highlights the weakest links of cyber security, the user’s mistakes when choosing their passwords, and different ways of password security in both personal, and business use.
Abstract
Passwords are used consistently in our everyday lives. Whether it’s from logging in to our smart phones, our computers, accessing our bank, etc. We need to use passwords to protect everything important to us, and to keep our information safe. If our passwords are known by a malicious party, we could lose not only access to our personal data, but potentially lose everything through identity theft. While it’s important to change our passwords occasionally, could requiring changes too frequently actually make our passwords worse. This paper highlights the weakest links of cyber security, the user’s mistakes when choosing their passwords. Additionally, this paper provides different ways of password security in both personal, and business use.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Usability and Security of Knowledge-based Authentication Systems: A State-of-the-Art Review

TL;DR: In this article , the authors compared various knowledge-based password schemes in order to establish a strategy that provided high memorability and resilience to most cyber-attacks, and identified areas of knowledge based passwords for further research and enhances the methodology that helps to offer insight into usable, secure, and sustainable authentication approaches.
References
More filters
Journal ArticleDOI

Users are not the enemy

TL;DR: It is argued that to change this state of affairs, security departments need to communicate more with users, and adopt a usercentered design approach.
Journal ArticleDOI

The domino effect of password reuse

TL;DR: One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.
Proceedings ArticleDOI

Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials

TL;DR: The first longitudinal measurement study of the underground ecosystem fueling credential theft and the risk it poses to millions of users is presented and a remarkable lack of external pressure on bad actors is observed, with phishing kit playbooks and keylogger capabilities remaining largely unchanged since the mid-2000s.

Password Security: What Users Know and What They Actually Do

TL;DR: Results indicate that, in general, users do not vary the complexity of passwords depending on the nature of the site (bank account vs. instant messenger) or change their passwords on any regular basis if it is not required by the site.
Proceedings ArticleDOI

Linux Security: A Survey

TL;DR: This paper presents a list of methods for securing a Linux system from both external and internal threats.
Related Papers (5)