Good Practice for Strong Passwords

نویسندگان

  • Kevin Curran
  • Jonathan Doherty
  • Ayleen McCann
  • KEVIN CURRAN
  • JONATHAN DOHERTY
  • AYLEEN MCCANN
  • GARY TURKINGTON
چکیده

The creation of strong, secure passwords is vital in our life todaydue to the implications of compromised access to our data. Passwords are commonly used to prevent unauthorized access to important information, to guarantee security of personal information, and to prevent unauthorized access to various services. It seems that people tend to veer toward adopting the simplest characters in forming their passwords and they also tend to reuse the same password for multiple accounts. This is natural due to the weakness of the average human mind but it can lead to attack from any of the passwordcracking tools. This article will examine best practice in creating secure

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Developmental Perspective on Weak Passwords and Password Security

In this study, 273 subjects were instructed to devise passwords that they might use for an important purpose, then asked how they had developed those passwords. The passwords developed were evaluated according to their complexity and adherence to strong password development standards, then were subjected to attack from a standard hacker tool. Results indicated generally weak passwords were deve...

متن کامل

You only live twice or "the years we wasted caring about shoulder-surfing"

Passwords are a good idea, in theory. They have the potential to act as a fairly strong gateway. In practice though, passwords are plagued with problems. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when forgotten. While alternatives to passwords have been proposed, none, as yet, have been adopted widely. There seems to be a reluctance to switch from tried and ...

متن کامل

A Conceptual Framework for Assessing Password Quality

Password authentication is the most widely used authentication mechanism, and it will still be with us for many years yet to come. It is effective, simple, and accurate, with no extra cost. The strength of password authentication relies on the strength of the passwords. Good (or strong) passwords are essential for high level security. End user education and computerized proactive password check...

متن کامل

From Very Weak to Very Strong: Analyzing Password-Strength Meters

Millions of users are exposed to password-strength meters/checkers at highly popular web services that use userchosen passwords for authentication. Recent studies have found evidence that some meters actually guide users to choose better passwords—which is a rare bit of good news in password research. However, these meters are mostly based on ad-hoc design. At least, as we found, most vendors d...

متن کامل

Update-tolerant and Revocable Password Backup (Extended Version)

It is practically impossible for users to memorize a large portfolio of strong and individual passwords for their online accounts. A solution is to generate passwords randomly and store them. Yet, storing passwords instead of memorizing them bears the risk of loss, e.g., in situations where the device on which the passwords are stored is damaged, lost, or stolen. This makes the creation of back...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011