1 Password Management Strategies for Online Accounts Shirley Gaw and Edward W. Felten Department of Computer Science Princeton University Sandhya Jognipalli.

Slides:



Advertisements
Similar presentations
Critical Reading Strategies: Overview of Research Process
Advertisements

Web Shift Booking System
SAM 2007 v4 The Student Experience Including SAM Projects, SAM Exams and SAM Training.
Student Getting Started Guide Updated June Ensure that you are connected to the Internet. 2. Launch your web browser (Internet Explorer, Firefox,
EDW647 Internet For Educators Setting Up a Gmail Account Roger W. Webster, Ph.D. Department of Computer Science Millersville University (717)
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Title 4 Effects of a student designed multimedia project on 8th graders attitude and performance.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Management of information. Objectives Discuss the benefits of good management practice Present reference management tools Present bookmark management.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
What is E-commerce Safety Precautions Password Strengths
1 Entering Grades and Indicators in the Standards-Based Report Card (SBRC) Users Manual for SBRC On-line Entry Interim Progress ReportsInterim Progress.
Nursing Grad Students Computer Orientation undergrad/all/computer_labs.html.
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
CIS 450 – Network Security Chapter 8 – Password Security.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
SiTEL LMS Focus Group Executive Summary Prepared: January 25, 2012.
Data gathering. Overview Four key issues of data gathering Data recording Interviews Questionnaires Observation Choosing and combining techniques.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
SAM 2010 v1.5 Student Walkthrough. Initial Set Up 1.Ensure that you are connected to the Internet. 2.Launch your web browser (Internet Explorer 7 or 8,
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Science Project Type your project title here Your name Mueller Park Junior High You are welcome to choose any design style for your project!
Slide Slide 1 Copyright © 2007 Pearson Education, Inc Publishing as Pearson Addison-Wesley. Lecture Slides Elementary Statistics Tenth Edition and the.
Psychological Factors u Attention - Focusing on specific behaviors to observe. u Sensation - Using senses to focus u Perception - Meaning of information.
Password Management Strategies for Online Accounts Shirley Gaw, Edward W. Felten Princeton University.
Slides to accompany Weathington, Cunningham & Pittenger (2010), Chapter 3: The Foundations of Research 1.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Reliability and Validity. Thinking Questions What is an IV? What is a DV? What is repeated measures design? What is matched pairs design? What is independent.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
INTERNET SAFETY FOR KIDS
CH 42 DEVELOPING A RESEARCH PLAN CH 43 FINDING SOURCES CH 44 EVALUATING SOURCES CH 45 SYNTHESIZING IDEAS Research!
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
AVI/Psych 358/IE 340: Human Factors Data Gathering October 3, 2008.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Helpful hints for planning your Wednesday investigation.
Independent Samples ANOVA. Outline of Today’s Discussion 1.Independent Samples ANOVA: A Conceptual Introduction 2.The Equal Variance Assumption 3.Cumulative.
Consumer Behavior, Ninth Edition Schiffman & Kanuk Copyright 2007 by Prentice Hall Chapter 2 Consumer Research.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Take Charge of your Finances
Common Methods Used to Commit Computer Crimes
Creating an Account on Wikieducator
Password Management Limit login attempts Encrypt your passwords
Take Charge of your Finances
Multi Rater Feedback Surveys FAQs for Participants
Multi Rater Feedback Surveys FAQs for Participants
How to Use Members Area of The Ninety-Nines Website
Setting up an online account
The Student Experience
Chapter 3: Protecting Your Data and Privacy
Anna Adams Martina Angela Sasse
Presentation transcript:

1 Password Management Strategies for Online Accounts Shirley Gaw and Edward W. Felten Department of Computer Science Princeton University Sandhya Jognipalli

2 Outline o Introduction o Related Work o Overview of Study o Quantifying Password Reuse o User Priorities o User Models of Attack o Survey Implications o Conclusions

3 Introduction o For password authentication systems, users often are the enemy o Users are ill-informed about dictionary attacks o Users do not understand of password policies o This paper broadly looks at password practices, quantifying password reuse and also surveying the contributing factors to this reuse o A survey of how users manage passwords for online accounts

4 Related Work o Many projects try to overcome poor password practices o Tools for users to manage their passwords, particularly password hashing systems o Researchers have also conducted empirical studies of password use and management o Few papers that empirically quantify how many passwords people have o Other studies have based estimations of people's passwords through surveys o Participants were first asked to login to websites and then count how many passwords they used

5 Overview of Study o Studied password practices, focusing on real users password reuse and the technology designs that encouraged these practices o Participants were compensated with $10 o 58 students completed an online questionnaire (First session) o Only 49 of the original participants completed the second session

6 Continuation… oQuantifying Password Reuse: How many online accounts do people have? oBugMeNot.com claims to have accounts for at least 107,116 free websites that use password authentication oPeople are unlikely to recall more than a handful of websites they use oDeveloped a login task where participants make one pass at recording their online account information with pre-made lists and then a second pass with open-ended queries oMethod: Of the 49 participants, 6 brought aids, 26 participants used their own laptops and the remaining 23 were provided with a Firefox web browser on a Dell PC

7 Continuation… oParticipants estimated their use of websites and passwords in two passes oIn the first pass, participants were directed to a CGI script that presented the names of 139 websites grouped into 12 categories (news, travel, finance, shopping etc) oThey were presented with a webpage that instructed them to log in to the website oThe experimenters observed participants attempting to login more than once oParticipants self-reported summary statistics on the number of passwords they used in the experiment

8 Continuation… o In the second pass, participants listed sites that they used but were overlooked in the first pass o Results and Discussion: The number of accounts in the 1 st pass is the number of successful login attempts, a conservative measure of the number of online accounts o The reported statistics from the 2 nd pass incorporate the information from the 1 st pass; it was not an independent measure o Out of the 139 sites presented to participants, they used a small portion of the sites o Participants had trouble recalling both usernames and passwords

9 Descriptive Statistics for Activity Covered by Login Task o Reports summary statistics for both the 1 st and 2 nd passes of the study When comparing responses to two questions, they tested the differences in medians using Wilcoxon's Matched Pairs Signed Rank Test (T). The t-test would be appropriate for interval measures, Likert responses were not always normally distributed, so they chose the nonparametric version of the t-test.

10 Reasons Cited for Failed Logins. Multiple responses allowed o Lists the reasons why participants said they were unable to login to websites

11 Mean number of website accounts by year of school with standard error bars o Shows that the number of accounts increased by year in school

12 Plot of reuse ratio and the number of on-line accounts with login authentication in the second pass o This plot demonstrates that people will reuse passwords more often when they have more accounts

13 User Priorities o Prior work has indicated that security is not a priority for users and that password authentication is seen as a nuisance rather than a protection o The premise of password authentication is identifying the user to protect access to a resource o People reuse user-names and passwords, users are vulnerable to attacks o The attacker could compromise multiple accounts through a single account's login information but also could compromise multiple accounts through a single user's login information

14 Continuation… o This section describes our results in studying user's behavior and the role technology has played in increasing password security o Method: 58 participants took a 115-question survey o Explanations of password reuse and avoidance, explanations of password creation and storage, and descriptions of password management methods o 5-point Likert scale (1 = Strongly Disagree, 2 = Slightly Disagree, 3 = Neither Agree Nor Disagree, 4 = Slightly Agree, 5 = Strongly Agree) for responses o Justifications of Password Practices: If there were “two websites where you use the same password" and, if so, “why do these websites have the same password.“

15 Continuation… o Reuse a password if it is unimportant o Protecting private information may motivate people to create unique passwords o Different passwords for different security levels of websites o Methods of Storing Passwords: What kinds of tools participants were comfortable using to store their passwords? o Memory was more commonly used than any computing technology o website cookies & password managers o Internet Explorer's AutoComplete, Netscape's Password Manager, and Firefox's Saved passwords o Portable Firefox became more popular. Portable Firefox is a zipped version of the Firefox browser that can be stored on portable devices such as USB jump drives

16 Reasons Cited for Using the Same Pass-word. Multiple responses allowed o The most common reason for reuse was that it makes a password easier to remember

17 Reasons Cited for Choosing a Different Password. Multiple responses allowed o This table shows that, one of most cited reasons was security; many were particularly concerned that having the password to one account would help an attacker compromise another account

18 Aids Participants Cited Using to Help Re-call Passwords. Multiple responses allowed o As shown in this Figure, participants relied on their memory

19 User Models of Attack o Perceived threat models for what they believed made a strong password and for who they believed was likely to attack their online accounts o Perceived Threat by Others: Who participants saw as likely attackers to online accounts o Method: Participants were first provided with examples where a password could be compromised o The population was partitioned: friend, acquaintance-nontech, acquaintance-expert, insider, competitor, hackers

20 Continuation… o In the first ranking, participants were asked to rank attackers by their ability to access information without permission from one of your web accounts o In the second ranking, by their motivation to compromise passwords o Finally, by their likelihood to attack an online account, considering motivation and ability o Results and Discussion: Friends were considered most able attackers o When considering overall likelihood of compromise, participants seemed to weigh both motivation and ability

21 Most Able Attackers 29% 33% 2% 7% 2% 27%

22 Most Motivated Attackers 5% 11% 51% 0% 4% 29%

23 Perceived Strength of Passwords o If users expect that having a personal connection to the attacker presents an advantage, we also expect that this influences what users perceive as strong passwords o Method: This was followed by a series of eleven statements which were chosen by finding WebPages that suggested methods for creating stronger passwords: o Use uppercase and lowercase letters in the password. o Use a password of at least six characters. o Avoid common literary names. o Mix up two or more separate words. o Create an acronym from an uncommon phrase. o Avoid passwords that contain your login ID.

24 Continuation… o Use numbers in the password. o Avoid abbreviations of common phrases or acronyms. o Drop letters from a familiar phrase. o Use homonyms or deliberate misspellings. o Use punctuation in the password. o Results and Discussion: The explanations of password rankings would frequently describe human attackers and include some notion of randomness o Users would understand that people have common techniques for creating passwords o Humans may guess how a password is constructed, but they can use automated tools for enumerating all of the possible choices

25 Survey Implications o How can we practically encourage users to avoid reusing passwords? o There are several tools for generating passwords o Assuming people are not using portable browsers, this convenience becomes an annoyance when they need to login from another location o Any site that sends password reminders over essentially uses to authenticate the user o The sites could choose a time when users are motivated to protect an account and when users understand the benefits of avoiding password reuse o Instead of querying usernames when users forget their passwords, websites could ask users to provide an address

26 Conclusions o This work has developed a broad description of password management strategies for online accounts o Current tips for strengthening passwords also fail to explain the nature of dictionary attacks o Simply knowing personal information would be beneficial to compromising a password o The nature of online accounts and tools for managing passwords in online accounts enable poor password practices rather than discourage them

27 Continuation… o Findings indicated that despite their technical abilities and education, they still had trouble understanding the nature of some attacks o While participants understood the benefit of having randomly generated passwords, they still pictured human attackers and strengthened passwords by making it difficult for a human to guess them o They demonstrated that password reuse is likely to become more problematic over time as people accumulate more accounts and having more accounts implies more password reuse

28