Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
© 2006 Richard M. Conlan Interface Designs to Help Users Choose Better Passwords (study design) Richard M. Conlan, Peter Tarasewich Northeastern University.
A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Richmond Affiliate Team Registration Using the Convio TeamRaiser tools to register and grow your team.
National Service Trust Automation Project Training Materials: Members and Alumni Corporation for National & Community Service (CNCS) National Service Trust.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
Center Accreditation Online System
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
ICT Curriculum Evening – an introduction to Wizkid.
Measuring and reporting outcomes for your BTOP grant 1Measuring and Reporting Outcomes.
Frictionless Commerce
Design description Prepared by: Peter Stark Last modified: 11/13/2007 Client: Big Hills Ski Resort Project: Resort Website, Version#4 Stark Designs.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Evaluation of Project Engage - Staff Side Team RENEU - Anran Ye - Aalap Doshi - Gaurav Pimprikar - Yung-Ju Chang.
1 Password Management Strategies for Online Accounts Shirley Gaw and Edward W. Felten Department of Computer Science Princeton University Sandhya Jognipalli.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Blackboard Strategies: Using Blackboard Pedagogically.
Central Virginia Affiliate Team Registration Using the Convio Teamraiser tools to register and grow your team.
Leadership for Student Success through After School Programs Presented by: California County Superintendents Educational Services Association with the.
On the Security of Picture Gesture Authentication Ziming Zhao †‡, Gail-Joon Ahn †‡, Jeong-Jin Seo †, Hongxin Hu § † Arizona State University ‡ GFS Technology.
Multiple Password Interference in text Passwords and click based Graphical Passwords by Sonia Chiasson, Alian Forget, Elizabeth Stobert, PC van Oorschot.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
10 Reasons to Use Google Analytics By: Errett Cord
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
Learning From Assessment: Evaluating the Benefits of DALI (Diagnostic Assessment Learning Interface) Hershbinder Mann & Guinevere Glasfurd-Brown, University.
CSC-682 Advanced Computer Security Analyzing Websites for User-Visible Security Design Flaws Pompi Rotaru Based on an article by : Laura Falk, Atul Prakash,
Getting started with myitlab. before you register  A valid address  Course ID from your instructor  Student access code Before you register,
Password Management Strategies for Online Accounts Shirley Gaw, Edward W. Felten Princeton University.
1 NTTC Training 2011 WHAT'S NEW IN 2011 TAXWISE - Highlights TaxWise Online Enhancements TWO Online and Desktop Enhancements.
Guidelines for ENSCONET partners in the use of the e-forum.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Create speaking avatars and use them as an effective learning tool.
Ms. Naira Room 121. Components Journal Entries:  Debits/Credits Financial Statements:  Balance Sheet, Income Statements Banking/ Savings/Loans  Balancing/writing.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Amber Johnson U.S. Department of Education WVASFAA Fall 2015 Conference October 29, 2015 FSA ID: The FSA PIN Replacement.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
DO NOW: 1.State whether you agree or disagree with this statement-and tell me WHY- “Everyone learns the same way.” Be prepared to justify your answer.
Creating and Using Your FSA ID: An Overview
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
SWBAT explain operating systems and how they influence their daily life. What type of computer do you use? Why?
Online Login Security Enhancement Creating an online username & password November 2015.
Class Discussions Using Facebook Presentation By: Katie Rosko.
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
E-ticketing ONLINE CINEMA TICKET BOOKING SYSTEM. What is eticketing system ? Modern science and technology are bringing us into the digital time. In the.
Gmail Password Recovery Process Find Gmail technical support for Gmail password recovery, recover Gmail password, reset Gmail password, change Gmail password,
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Www. pdst. ie PDST Data Gathering Workshop Lorcán O Callaráin
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
A Quick Start Guide to Online Ordering
Assess Survey Invitations
Multi-Factor Authentication
Cross-Site Request Forgeries: Exploitation and Prevention
Tangled Web of Password Reuse
ISE Website Encourage International Service Employees to regularly check the website to view financial reports (e.g. payroll information), download.
Setting up an online account
User Registration.
Exercise: Hashing, Password security, And File Integrity
Anna Adams Martina Angela Sasse
Presentation transcript:

Password Management Strategies for Online Accounts Gaw & Felten Optional Reading

Background Users often are the enemy Non-compliance with password practices occurs and undermines the system Paper studies broad password practices Proliferation of website logins Quantifies and surveys the factors relating to password reuse

Related Work Some papers have tried to address the problem of poor password practices Some have suggested graphical passwords, i.e. pictures or points in an image Others have looked at password hashing schemes with a ‘master’ password

Study Details, 1 Users were asked to evaluate their likeliehood of attack from different groups How did users justify subverting password policy? This study collected information based on login attempts to websites and then were asked how many passwords they used

Study Details, 2 First pass – Participants were prompted with a list of sites by category Record if they have an account If yes, then 90 seconds to login to the website Success= Write down the password, Failure= User explain why Recorded: # Recorded: # of passwords collected, # of unique passwords, the size of classes of similar passwords, # of password repetitions, and # of passwords with related meanings.

Study Details, 3 The second pass was open, no list Record all other sites that you use a password for Aggregate these statistics from the first pass

Results and Discussion Participants forgot the password or username but not usually both Even though they had a relatively small number of accounts (7-14), reuse still occurred As the number of accounts grows, reuse frequency increases

User Priority and Password Justification, 1 Sites use login information for different things E-commerce vs. New York Times.com Varying level of usage confuses users; they perceive little benefit. Number One reason for password reuse: “It will be easier for me to remember”.

User Priority and Password Justification, 2 Sites were also user categorized, i.e. message boards vs. banking, for strength and reuse Students were motivated to uniqueness when concerned with financial information and personal correspondence

Password Storage Memory was the number one storage tool Some users used cookies, i.e. “remember me” Others used the embedded features of their browser to remember their passwords Still, these methods were far down the list in favor of memory

Who will attack? Participants were asked to rank in terms of ability, then in terms of motivation, then in terms of both One group felt that non-affiliated person would have the most to gain, hence being likely attacker Others felt that those close to them had the interest and the access and hence would be more likely an attacker

Strength of Passwords If those closest are most able to crack us, then this should influence what users perceive as a strong password By asking users to rank the security of 3 different passwords, they attempted to understand the user perception of security This led to the realization that most participants envisioned a human attacker, using a guess-and-check methodology

Conclusions Many password management tools do not facilitate the users main tool – memory Instead of just filling in the user password, management tools could display it in a low contrast background until they learn it, then they can turn it off. Also, websites can use challenge- response for password recovery instead of

Conclusions, 2 Users misunderstand the nature of attacks and attackers Explaining dictionary attacks in password strengthening tips helps. Existing tools are not equipped to deal with the problem of password reuse Users most likely be able to adopt tools to aid them in password management