Password Education Based on Guidelines Tailored to Different Password Categories
نویسندگان
چکیده
منابع مشابه
Password Education Based on Guidelines Tailored to Different Password Categories
General password policies do not guarantee that passwords fulfilling the requirement are good enough. The policies have a tendency to be too broad to be useful for all users. Different users have different designing processes based on what kind of passwords they most easily remember. Users are also often left to generate passwords on their own without any training. In our study we used new pass...
متن کاملPSV (Password Security Visualizer): From Password Checking to User Education
This paper presents the Password Security Visualizer (PSV), an interactive visualization system specifically designed for password security education. PSV can be seen as a reconfigurable “box” containing different proactive password checkers (PPCs) and visualizers of password security information, allowing it to be used like a “many in one” or “hybrid” PPC. PSV can provide many new features tha...
متن کامل∅pass: Zero-storage Password Management Based on Password Reminders
A plethora of Internet services and applications require user authentication. Although many alternatives have been proposed, and despite the significant advancement in attackers’ capabilities to perform password cracking, the most attractive authentication technology today, is still text-based passwords. The last years, there is a rapid increase in the number of web services a user accesses in ...
متن کاملApplying Chunking Theory in Organizational Password Guidelines
This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller’s (1956) and Cowan’s (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on ...
متن کاملPassword Visualization beyond Password Masking
When entering a password (or other secrets) the typed input is most commonly masked, i.e. the characters are hidden behind bullets or asterisks. This, however, complicates the input and highly decreases the user’s confident causing several issues such as login failure attempts. On the other hand, password masking is an important security requirement for a lot of applications and contexts to pre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computers
سال: 2011
ISSN: 1796-203X
DOI: 10.4304/jcp.6.5.969-975