How Secure is your Password? An Analysis of E-Commerce Passwords And Their Crack Times

نویسندگان

  • Joseph A. Cazier
  • John A. Walker
  • Dawn Medlin
چکیده

The purpose of this paper is to examine passwords that are created by endusers in relationship to length, strength, and crack times. Examinations of these passwords illustrate the connectivity between password length and strength and the need to educate users as to the importance of their password choices. Through an empirical analysis of actual user passwords from a commercial website, this paper examines whether the passwords created by individuals on an e-commerce site follow "good" or "bad" password practices. Additionally, this paper addresses the issue of crack times (the time it takes to ‘crack’ a password) in relationship to password choice. The results of this study show the actual password practices of current consumer’s use and should indicate to both organizations and endusers the need for further education and the need for more secure password choices. Almost a third of passwords were cracked in less than one minute, and lacked basic features that should be in any secure password.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Keystroke Dynamics Authentication

Everybody needs to authenticate himself on his computer before using it, or even before using different applications (email, e-commerce, intranet, . . . ). Most of the times, the adopted authentication procedure is the use of a classical couple of login and password. In order to be efficient and secure, the user must adopt a strict management of its credentials (regular changing of the password...

متن کامل

An Empirical Investigation: Health Care Employee Passwords and Their Crack Times in Relationship to HIPAA Security Standards

The purpose of this article is to examine the passwords selected by health care professionals and the security and privacy standards in relationship to those passwords as addressed by the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Examinations of these passwords have illustrated the connectivity between password length and strength and the need to educate employees as ...

متن کامل

Toward a secure and usable cloud-based password manager for web browsers

Web users are confronted with the daunting challenges of creating, remembering, and using more and more strong passwords than ever before in order to protect their valuable assets on different websites. Password manager, particularly Browser-based Password Manager (BPM), is one of the most popular approaches designed to address these challenges by saving users’ passwords and later automatically...

متن کامل

A Novel Web - based Approach for Balancing Usability and Security Requirements of Text Passwords

Many Internet applications, for example e-commerce or email services require that users create a username and password which serves as an authentication mechanism. Though text passwords have been around for a while, not much has been done in helping naive Internet users in creating strong passwords. Generally users prefer easy-to-remember passwords, but service provides prefer that users use a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006