What´s Single Password Authentication?

Improved Essays
Acar, T., Belenkiy, M., & Küpçü, A. (2013). Single password authentication. Computer Networks, 57(13), 2597-2614. doi:10.1016/j.comnet.2013.05.007

This qualitative analysis illustrates the authors’ proposed protocols for a password authentication system requiring the user to remember only one login and password. Their protocols would allow access to either a cloud server or mobile device to handle all authentication needs. They analyze how the protocols would be resistant to online dictionary attacks, phishing schemes, cross-site impersonation, and honeypot attacks. They acknowledge that in order to implement their protocols they would need support from large organizations like Microsoft or Google, but they feel confident the code implementation
…show more content…
The authors do a review of password authentication history looking at the origins of many of the password rules. They identify two modes of thinking in regards to passwords they deem as outdated. One is the model where a user is creating passwords independently and uniformly from a set of passwords. The other where hackers are attempting security breaches via offline attacks. They argue these outdated models have caused an overemphasis on particular user behaviors that really are not that dangerous. This is a very well written common sense report. It acknowledges that no matter how much they are disdained, nothing beats the password in terms of usability and ease of implementation. It also attacks many of the rules of password management and demonstrate how they are not effective. It actually does advocate password reuse (a rare occurrence) but limits the advice. It only states that passwords should not be reused for “important” accounts but other than that it is ok. The advice is good, but not substantial enough. Still, it is a great article showing that a practical meeting of security concerns and user abilities is …show more content…
It is a quantitative approach, taking 62 undergraduate students studying business and determines their behavior when faced with password composition rules. There were 27 in the control group and 35 in the study. The rules were quite ordinary as they should be eight characters long, not contain personal information, and not be blank or “password”. They also should contain three of the four following characteristics: contain uppercase characters, contain lowercase characters, contain numbers, and contain non-alphanumeric characters. The study found the rules did not reduce the incorporation rate of meaningful information, but that they did reduce the amount of password reuse. However, participants in the study group felt they would have difficulty remembering their password after as little time as one

Related Documents

  • Decent Essays

    A strong password would be a password with at least 12 characters, the more characters you have the less the chance of getting your account stolen. 3. Give examples of computer crime and cyber crime that illustrate…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    The usernames and passwords are a unique key to log into a computer or network. When computers have usernames and passwords enabled this adds a security feature so that if the computer is a sleeping state credential need to be input to unlock the computer. For example, if one user was to leave a computer open on his desk and went to do another task, another user or possibly an intruder that has gained access into the building can gain access to files on the computer or the network. Therefore, network administrators have an important role in providing the most reliable security by simply implementing user credentials.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Biometric Analysis Paper

    • 791 Words
    • 4 Pages

    In the end, what may prove most useful is the mix of biometric methods. Sophisticated computer network attacks that increase human resource, maintenance and operation costs prompt the need for more advanced security techniques. Without added measures of security, the networks of organizations everywhere will be increasingly susceptible to additional types of attacks. Biometrics involves being able to compare objects and determining if there is a match. Biometric authentication captures an image and builds a template of the image to be used for future comparison.…

    • 791 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Myris Research Papers

    • 760 Words
    • 4 Pages

    2a. The computer based innovation represented by my computational artifact is called Myris. Myris is a biometric security system that scans one’s iris to algorithmically process video images of the user’s eye signing them into secure websites, devices and other personal profiles. The intended purpose of Myris is to eliminate the utilization of standard passwords and to create a secure and foolproof method for accessing personal data. Simply put, “It lets anyone sign into accounts on websites or applications and unlock protected files with a quick glance into the mirror on its face” (http://dickinson.is/designing/eyelock/).…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question #1 1.1) According to Schrems (2014) vulnerability can mean many things, but one definition of vulnerability is when there is the potential for harm to occur without the ability to protect yourself. I would consider this family vulnerable, especially the new mother, Fatima. As she suffers from post traumatic stress disorder, and safety concerns both inside and outside the home. However, other characteristics or needs that would influence participation in the research study are cultural beliefs, such as a paternalistic household (Shami & Sheika, 2000), language barrier, no local family support, and Fatima’s distrust in medical professionals (Kaakinen, 2015).…

    • 571 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Nowadays it seems like you can’t even access half of the websites you would like to with using some sort of authentication. To help solve this issue a large number of websites have created login systems that are centralized. The centralized systems supply users with an electronic identity of sorts which is better known as a federated identity. This paper will discuss some problems that can arise when not having SSO in place, some advantages and disadvantages when using SSO for AD and LADP access and a comparison between Kerberos-based and smart card based SSO.…

    • 1172 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Authentication and Digital signatures INTRODUCTION This paper will focus on Authentication and Digital Signatures, and outline strategies for Implementation, present techniques on how to apply, adapt, and extend Authentication and Digital Signatures in areas such as encryption, and verification. Digital signatures prevent persons from acting as the originator of a specific document, which is comparable to forgery on a printed text. Authentication is the primary and most critical line of defense in a system and public networks. It is now common in many stores where credit card payment can be electronically signed using a stylus.…

    • 1445 Words
    • 6 Pages
    Great Essays
  • Brilliant Essays

    Research Questions:  This study would critically analyze these research questions:  What are the main security issues faced by using e-banking system?  What Impact does the security issues or challenges have on e-banking? Literature Review Internet banking is the can be classified as the fastest method of banking in the world compared to the old traditional banking system. The purpose of this literature review is to examine research that addresses the analysis of information security in the e-banking sector.…

    • 3150 Words
    • 13 Pages
    Brilliant Essays
  • Improved Essays

    Cyber Criminals

    • 2010 Words
    • 8 Pages

    Over the past twenty years the banking system has changed and become more efficient for bank customers. Twenty years ago bank customers could not login to their bank account on the Internet and transfer money. However, as the Internet has developed so has online banking. As more people use online banking services the amount of cyber criminals that focus on accessing bank accounts has increased. To log into a bank account in the U.S. a password and security question is needed, in other countries such as Sweden electronic-ID is used to login to a bank account.…

    • 2010 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    Diffie And Hellman

    • 1622 Words
    • 7 Pages

    Introduction Cryptography can be defined as the process of encrypting and decrypting data in order to keep the information protected from anyone other than the two (or more) people involved in the communication. Preventing unauthorized users from being able to read the information exchanged over an insecure channel, i.e. maintaining ‘privacy’ is one serious cryptographic problem, which is why it is essential for the communicating parties to share a key that is unknown to others. This key distribution problem levies major cost and delay to large business and/or teleprocessing networks. Diffie and Hellman propose two ways to deal with transmitting keys over an insecure public channel without negotiating the security of the system: 1. Public…

    • 1622 Words
    • 7 Pages
    Superior Essays