rulekaspersky.com

kaspersky.com  时间:2021-03-23  阅读:()
T.
TryfonasandI.
Askoxylakis(Eds.
):HAS2014,LNCS8533,pp.
127–137,2014.
SpringerInternationalPublishingSwitzerland2014ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle*Yee-YinChoongNationalInstituteofStandardsandTechnology,100BureauDrive,Gaithersburg,MD20899,USAyee-yin.
choong@nist.
govAbstract.
Passwordsarethemostcommonlyusedmechanismincontrollingusers'accesstoinformationsystems.
Littleresearchhasbeenestablishedontheentireuserpasswordmanagementlifecyclefromthestartofgeneratingapassword,maintainingthepassword,usingthepasswordtoauthenticate,thentotheendofthelifespanofthepasswordwhenitneedstobechanged.
Wedevelopacognitive-behavioralframeworkdepictingthecognitiveactivitiesthatusersperformwithineachstage,andhowthestagesinteractwiththehumaninformationprocessor,i.
e.
memoryandattentionresources.
Individualfactorsarealsorepresentedintheframeworksuchasattitudes,motivations,andemotionsthatcanaffectusers'behaviorsduringthepasswordmanagementlifecycle.
Thepaperdiscussescognitiveandbehavioralactivitiesthroughoutthelifecycleaswellastheassociatedeconomics.
Weshowtheimportanceofaholisticapproachinunderstandingusers'passwordbehaviorsandtheframeworkprovidesguidanceonfutureresearchdirections.
Keywords:password,passwordmanagementlifecycle,cybersecurity,passwordpolicy,usability,cognitive-behavioralframework,economicsofpasswords.
1IntroductionText-basedpasswordsarethemostcommonlyusedmechanismincontrollingusers'accesstoinformationsystems.
Arguably,passwordsarecurrentlythebestfitformanyauthenticationneedsaspasswordsallowaccessfromanywhereassumingonlyasimplebrowserandrevocationisassimpleaschangingpasswords[1].
Usersoftenpossessmultipleaccount-passwordpairsforwork,schoolandprivateuse.
Forexample,itisreportedthatanaverageuserhas25webaccountsrequiringpasswords[2],andemployeesoforganizationshaveabout4[3]to9passwords[4]atwork.
UsersareoftenviewedbyITsecurityprofessionalsastheweakestlinkofcybersecurity[5,6].
Usersarealsoblamedforemployinginsecurebehaviorssuchasselectingbadandsimple-easy-to-guesspasswords,reusingpasswords,writingdownorsharingtheirpasswords,and,wheneverpossible,notchangingtheirpasswordsona*Therightsofthisworkaretransferredtotheextenttransferableaccordingtotitle17U.
S.
C.
105.
128Y.
-Y.
Choongregularbasis.
Forexample,inarecentmajorsecuritybreachinwhich150millionuseraccountswerecompromised,"123456"wasusedthemostasthepasswordbyover2millionusers,followedbyalittlemorecomplicatedpassword"123456789",andtheword"password"ranked3rdusedby345,000users[7].
Ontheotherhand,forusers,usabilityofpasswordsistheirmainconcern.
Usershavetojugglemultiplepasswordsforwork,schoolorpersonaluseandoftenareforcedtocomplywithpasswordpoliciesthattheyviewasburdensome[4,8].
Frustrationwithloginproblemssuchasforgettingormistypingpasswordsincreasegreatlywiththenumberofpasswordsthatusersmustmanage[1,4].
Usersperceivethatsecuritymeasureshindertheirproductivityandsometimesuseworkaroundstobreakthesecurityprotocol[4,8].
Researchfocusingonhumanfactorsandusabilityofpasswordshasbeenchallengingtheviewthatusersaretheprimarycauseforcybersecurityissuesandpointingoutthatsecuritypoliciesareoftenimposingunreasonablerequirementsandpushingusers'cognitivelimits.
Forexample,atypicalenterprisepasswordpolicycanrequireitsemployeescreatecomplicatedpasswords,notwritedownorstorethem,changepasswordsevery90days,andnotreusethelast10passwords.
Itisalmostimpossibleforemployeestocomplywiththisstringentpolicyespeciallywithmultiplepasswordsastherearefundamentallimitationsonhumanmemory(e.
g.
limitedmemoryspan,memorydecay,recognitionvs.
recall,andmemoryinterferences)assummarizedbySasseetal.
[9].
Manystudieshaveinvestigatedtheconstructofusers'selectionof"good"or"bad"passwords[10-12].
Researchersalsochallengethenecessityandtrueeffectivenessofusingaggressivepasswordpoliciesforsecurityandsacrificingusabilitythatforcesuserstoadoptinsecurepracticesandmayeventuallycompromisesecurity[13-15].
Asshown,studiesareabundantonpasswordusabilityanditsimplicationsoncybersecurity.
However,littleresearchhasbeenestablishedonthecognitiveandbehavioralaspectsoftheentireuserpasswordmanagementlifecycle,i.
e.
fromthestartofgeneratingapasswordtotheendofthelifespanofthepasswordwhenitneedstobechangedduetoeventssuchasforgetting,expiration,orcompromise.
Whileperformingresearchonaparticularstageofthelifecycleprovidesvaluableinsightonusers'experiencesduringthatstage,itdoesnotoffercompleteunderstandingoftheentireprocessandcouldmissopportunitiesforidentifyingpotentialinteractionsandinterdependenciesamongvariousstagesduringthepasswordmanagementlifecycle.
Thispaperfocusesontheholisticviewoftheend-to-endpasswordmanagementlifecycleandproposesaframeworkconnectingthedotsofusers'activitiesduringthelifecycle.
Thisframeworkservesasafoundationinguidingfutureresearchdirections.
2TheCognitive-BehavioralFrameworkWedevelopaframeworktorepresentthecognitiveprocessanduserbehaviorsintheend-to-endpasswordmanagementlifecycleandtoguideourfutureresearch.
Theuserpasswordmanagementlifecycleconsistsofthreestages:Generation,Maintenance,andAuthentication.
Theframeworkdepictsthecognitiveactivitiesthatusersperformwithineachstage,andhowthestagesinteractwiththehumaninformationprocessor,i.
e.
memoryandattentionresources.
Inaddition,individualfactorssuchasattitudes,ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle129motivations,andemotionsarealsoincludedthatcanaffectusers'decision-makingandbehaviorsduringthepasswordmanagementlifecycle.
TheframeworkisillustratedinFigure1andeachstageintheuserpasswordmanagementlifecycleisdescribedindetailinthesectionsbelow.
Fig.
1.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle2.
1PasswordGenerationInthefirststageofthepasswordmanagementlifecycle,i.
e.
Generation,usershavetogenerateaplausibletextstringbycombiningvariouscharacterstosatisfytherequirementsforaccessingtheassociatedaccountorsystem.
Therequirements,knownascompositionrules,areacommonorganizationalapproachaimedatforcinguserstoselectstrongerpasswords.
Thecontentsandwordingsofthosecompositionrulesvarygreatlyfromsystemtosystem,buttheygenerallyconsistofruleson:passwordlength(minimumand/ormaximum),use(allowedorprohibited)ofcertaincharacters(uppercaseorlowercasealphabets,numericaldigits,specialcharacters),use(allowedorprohibited)ofcommonnames,dictionarywords,birthdaysorotherpersonalinformation.
Compositionrulescanbepresentedasjustpasswordselectionguidelinesinsomesystems,whereasforothersystems,therulescanbeprogrammaticallyenforcedsuchthatusershavetocreatecompliantpasswordsinordertogainaccesstothesystems.
130Y.
-Y.
ChoongThispasswordgeneratingandcomposingprocessissimilartoawritingprocessthatusuallystartswiththewritersettingupthegoalsofthewriting,understandingtheconstraints(e.
g.
grammar,targetaudience),generatingideas,selectingandarrangingwords,constructingtext,andfinallyrefiningthewrittentext[16].
Thisprocess,inessence,isaproblemsolvingprocessthatincludeshighermentalfunctionsandcreativethinking[17].
Passwordcompositionprogressesinasimilarwaywiththeuserfirstsettingthegoalsofwhataccount/systemthepasswordisfor,understandingtheconstraints,choosingcharacters,thenrefiningthetextstringtomeetthepasswordrequirements.
Theconstraintstothepasswordgenerationproblemcanbecategorizedas:(1)Environmental–suchascompositionrules,platforms(e.
g.
desktopand/orlaptopcomputers,and/ormobiledevices),account/systemtype(e.
g.
web,application,orhardwareaccess);(2)Cognitive–suchasmemoryloadandattentionresources,rulecomprehensionability;(3)Individual–suchasattitudes,motivation,andperceptionofthecriticalityandsensitivityoftheaccountandpotentialsecuritythreats.
Thisstagecanbeiterativeastheusertriestofindthebestcombinationofcharactersthatsatisfiesthepasswordrequirementswhiletakingintoaccountotherenvironmentalconstraints,human-informationprocessconstraints(e.
g.
attentiondeficit,memorycapacity)andindividualfactors(e.
g.
attitudes,motivations,andemotions).
Thisstagecanalsobeapurelydecisionmakingstagewithoutinvolvingpasswordcompositionoronlyinvolvingcompositionpartially.
Thishappenswhentheuserdecidestoreuseormakeminorchangestoanexistingpasswordasthebestapproachinthesolutionspacewhilemeetingthepasswordrequirementsandtheuser'sindividualneeds.
2.
2PasswordMaintenanceOncetheusergeneratesasatisfactorypasswordforaspecificaccount/system,thepasswordmovesintoitssecondstageofthelifecycle,Maintenance.
Theusermakesdecisionsonhowhe/shewillkeeptrackofthenewlygeneratedpassword,bymemorizingorstoringusingsomemechanism;andhe/shealsoneedstodecidehowbesttoorganize–mentallyorphysically–thenewlygeneratedpasswordalongwithotherexistingandactivepasswordstominimizememoryinterferencesatalaterstage.
Iftheuserdecidestomemorizethepassword,he/sheneedstoemploysomestrategies(e.
g.
mnemonicdevice,roterehearsing,ortypingmultipletimestoestablishmusclememory)tomakesurethepasswordhasbeenencodedproperlyintothelong-termmemory.
Iftheuserdecidestostorethepassword,he/sheneedstodecidethestoragemechanism,forexample,writingdown(initsentirety,partially,ordisguised),recordingelectronically(file,devices,etc.
),orutilizingsomepasswordmanagementsoftware.
Sometimes,theremaybeanorganizationalpolicyonhowpasswordsshouldbemaintainedbylimitingmaintenanceoptionstousers.
Forexample,"Passwordsshouldneverbewrittendownorstoredon-linewithoutencryption.
"isthemostcommonpolicysetbymanyorganizations.
ItshouldbenotedthattherecanbeinteractionsandinterdependenciesbetweentheGenerationandMaintenancestagesastheusermayholdanaprioripreferenceonwhethertomemorizeortostorethepasswordwhichcanimpacttheuser'spasswordACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle131composingprocesswiththethoughtthathe/shehastomemorizethetextforlateruse.
Also,thememorabilityofatextstringcanimpacttheuser'sdecisiononhowtomaintainthepassword.
2.
3AuthenticationThelaststageinthelifecycleisAuthenticationinwhichthepasswordisusedtogainaccesstotheassociatedaccount/system.
Theauthenticationstageisrepetitiveasthepasswordwillbeusedmultipletimesforitsentirelifespanuntilachangeeventoccurssuchasforgotten,expiration,passwordcompromised,oruser'sdesiretosynchronizemultiplepasswordsfordifferentaccounts.
Ineachauthenticationinstance,theuserneedstoretrievethecorrectpasswordeitherbyrecallingfrommemoryorbylookingupfromstoredmediathatmatchestheassociatedaccount/systemforaccess,atthesametimestruggleswithforgettingduetomemorydecayorinterferencesfromotherpasswords,andneedstoenterthepasswordcorrectlywhichrequiresattentions,motorskills,musclememory,andhand-eyecoordination.
Therearemanyfactorsthatcanaffectauser'sauthenticationexperiencewithapasswordsuchasauthenticationfrequency,howthepasswordismaintained,memorabilityandtype-abilityoftheaccount/passwordpair,orinterferencesfromotherpasswords.
Theauthenticationexperience(positiveornegative)cantheninfluencehowtheusercreatesnewpasswordswhenhe/shemovesoutfromtheauthenticationstageandstartsthenextpasswordmanagementlifecycle.
3HolisticResearchApproachonUserPasswordBehaviorsGuidedbytheFrameworkTheframeworkservesasaconstantreminderinresearchapproachestoalwaysconsiderusers'passwordbehaviorsinaholisticmannerthat,atanypointoftime,theusersaregoingthroughastageinthepasswordmanagementlifecycleandtheirbehaviorsareareflectionoftheinteractionsamongstagesinthelifecycle,thecapabilitiesandlimitationsofthehumaninformationprocessor,andtheindividualfactors.
Inthefollowingsections,wediscusstheimportanceofemployingaholisticapproachandsomemisconceptionsintheliteratureonuserpasswordbehaviorsresearch.
Wealsoreviewrelevantresearchandpointoutareasforfurtherresearch.
3.
1PasswordGeneration–MorethanaSelectionTaskThemostcommonmisconceptionofpasswordgenerationintheliteratureisthenotionofusers'selectingpasswords.
Itisoftendescribedthatusersselectbadandinsecurepasswords[11,18,19].
However,generatingpasswordsismorethanaselectiontaskinthattheword"selection"implieschoosingfromasetofreadilyavailablepasswordoptions.
Usersonlyselectpasswordswhentheydecidetoreuseexistingpasswords.
Inpasswordgeneratingtasks,usersemployhigh-levelcognitive,132Y.
-Y.
Choongproblem-solvingtaskswhentheyarefacedwiththetaskofcomposingtextstringstosatisfypasswordrequirementsofcombiningandarrangingvariouscharacterswithlengthlimitswhiletryingtomakesenseofthetextstringsandmeetingtheirownpersonalneeds.
3.
2PasswordComposition–ProblemSolvingAsnotedearlier,passwordcompositionisinessenceproblemsolvinginthatitinvolvesgoalsdefining,ideassearching/planning,andrefining/finalizing.
Therehavebeenfewstudiesinvestigatingpasswordgenerationunderrestrictivecompositionrules[11,20,21].
However,thosestudiesfocusedonlyontheoutcomesofthepasswordgeneration,i.
e.
thecharacteristicsofthepasswordsgenerated,andtheimpactsoftherestrictions,butdidnotinvestigatetheentiregenerationprocess.
Passwordresearchhasseldomrecognizedthatcompositionisnotatrivialtask.
Thereisaneedforresearchonhowuserssolvethe"passwordgeneration"problemfromthebeginningwhenusersfirstencounterandperceivetheproblemdomain;comprehendtheconstraints(Environmental,Cognitive,andIndividual);explorethesolutionspace;verifysolutionfeasibility;refine/narrowsolutionspace;andmakedecisionsonthebest-fitsolution.
Byresearchingpasswordgenerationasaproblemsolvingeffortwiththeframework,itenablesustoinvestigatetopicssuchasthedifferencesamongthe"problemsolvers"(e.
g.
expertsvs.
novices);theimpactsofpasswordconstraintsonthesolutionspace;themostimportantfactor(s)leadingtothebest-fitsolution;andtheinfluencesofthemaintenancedecisiononpasswordgeneration.
3.
3TheEconomics–PasswordManagementLifecycleThecostofpasswordsappearslowataglancefromtheserviceproviders'perspectiveasdeployingafunctionalpasswordsystemisrelativelysimplecomparedtootherauthenticationalternativessuchasbiometricsorsmartcards.
Fromtheusers'perspective,itdoesn'tseemtocostmuch,either,sincepasswordsallowinstantaneousaccountsetupandarereadilyunderstood[1].
However,therearesignificantcostsassociatedwiththepasswordauthenticationmechanismforboththeserviceprovidersandtheendusers.
Itisshownqualitatively[15]thatanunusablepasswordpolicycandegradeemployees'productivity,andultimatelyaffecttheorganization'soverallproductivity.
Itisreportedthatmorethan30%ofITsupportcentercallswererelatedtopasswordresets[22].
Onaverage,eachcalllastsabout5minutesandthecostofsupportperincidentis$251onaverage[23].
Inadditiontothesupportcentercost,therearealsocostsassociatedwithauser'stimeandproductivitylosswhenmakingcallstothesupportcenter.
Ofthethreestagesintheuserpasswordmanagementlifecycle,GenerationandAuthenticationarethemosteffort-andtime-consumingstagesfortheusers.
Itisimperativeforresearcherstostartinvestigatingtheassociatedcostsforthesetwostagesfromtheusers'perspective.
1AllcostestimatesinthispaperarebasedontheUnitedStatesdollar,i.
e.
USDorUS$.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle133TheCostofPasswordGenerationBesidescompositionrules,organizationsoftenincludeotherrequirementssuchaspasswordexpiration,passwordreuselimitations,andpassworduniquenessintheirorganizationalpolicies.
Itwillbedifficulttoquantifythedirectimpactsofthepasswordpoliciesonusers'cognitiveactivitiesandbehaviorsandtranslatetheimpactsintoassociatedcosts.
Onewaytoestimatethecostsistolookatthenumberofpasswordsgeneratedandthetimeittakestogeneratethosepasswords.
InthestudyperformedbyChoongetal.
[4],itisreportedthatanemployeehasonaverage9work-relatedpasswords.
Anorganizationalpasswordpolicycommonlylookslike:PasswordmustbeoChangedatleastevery60daysoAtleast12characterslongoConsistentwiththecomplexityrequirements(mixed-casecharacters,numbers,andspecialcharacters)PasswordmustnotoBewrittendownorstoredon-lineonnon-organizationsystemsoReuseanypasswordofthelast24priorpasswordsoUsethesamepasswordonmultiplesystems,applicationsorwebsitesIfanewemployeeacquireshis/her9passwordsinthefirstmonthsonthejob,byfollowingthepolicy,itmeansthatthenewemployeewillhavetogenerate54uniquepasswordswithinthefirstyearofemployment,whichmeansthatauniqueandcomplexpasswordisgeneratedonaverageeveryweekthroughouttheyear.
Theconstantpasswordgenerationtaskputsahugeamountofburdenonemployeeswhoonlyseemanagingpasswordsasasecondarytaskenablingaccesstotheirprimarytask[24].
Thisestimatedoesnottakeintoaccountotherpasswordgenerationeventsoutsideoftheregularchangingcycleduetounplannedincidentssuchasforgottenpasswordsorpasswordcompromises.
Itisalsoreportedthatthelongesttimeittakestogeneratepasswordsforworkis,onaverage,98.
5minutesforfrequentpasswordsand86.
6minutesforoccasionallypasswords[4].
Theworstscenario:ifeverypasswordtakesthelongesttimetogenerate,anemployeecanspend18.
6hours(or2businessdays)ata60-daycycleeachyeargeneratingpasswordsfortheirwork.
Iftheaverageannualwageof$81,704(or$39.
15/hour)offederalcivilianworkersisused[25],wecanestimateanannualcostof$728.
19peremployeebeingpulledawayfromworktogeneratepasswords.
TheCostofAuthenticationUsersinteractwithauthenticationsystemsonadailybasisforwork,school,orforpersonaluse.
AsshowninFigure1,eachauthenticationinstanceinvolvesretrievingthecorrectpassword(frommemoryorfromstoredmedia)andtypingthepasswordtogainaccess.
Thisauthenticationinstancecanbeiterativeinitselfifanystepfailsinthesequence,e.
g.
incorrectpasswordretrieved–forgettingorinterferences,typingerrors,orsystemfailure.
134Y.
-Y.
ChoongResearchinvestigatingreal-lifeuserauthenticationexperienceincludesdiarystudies,e.
g.
[15,24,26,27],andlongitudinalstudies,e.
g.
[2,28].
Thenumberofauthenticationinstancesvariesgreatlyinthosestudies,rangingfromtyping8.
11passwordsperday[2],75passwordeventsinatwo-weekspan[27],to23authenticationeventsinadaywith46.
9%(~11times)beingpasswordlogins[24].
Usersexpressedfrustrationandtimewastedfromvariousloginproblemssuchasmistypingpasswords,forgettingpasswords,mismatchingaccountandpassword,andgettinglockedout[4].
Whenenteringpasswordsfrommemory,itisreportedthatthemostcommonerrorisincorrectcapitalization(shifting),followedbymissingcharacter(s)[29].
Whileitisdifficulttoestimatethefullcostsofusers'authenticationexperiencewithpasswords,wecanstartwithasimplifiedwaytocalculatethecostsassociatedwithpasswordentry.
InthediarystudydoneattheNationalInstituteofStandardsandTechnology(NIST)[24],employeesenteredpasswordsabout11timesinadayandtheNIST'spasswordpolicyrequirespasswordsbeing12charactersorlonger.
Asreportedin[21],ittakesroughly14secondstotypeapasswordof8characterslong.
Estimatingconservatively(astheNISTrequiredpasswordsarelongerthan8characters),atypicalfull-timeemployeecanspend10.
27hoursayearontypingpasswordsforauthentication2.
Theestimateshouldbedoubled,i.
e.
20.
54hours,asacompleteauthenticationoftenincludestypingtheusernamebesidesthepassword.
Usingthesamewageinformation(i.
e.
$39.
15/hour)in[25],theannualcostperemployeeonenteringusernameandpasswordpairsforauthenticationisroughly$804.
14.
Foranorganizationwith100employees,aroughestimateof$153,000annuallycanbespentonemployees'basicpasswordmanagementactivities(Maintenancenotincluded),i.
e.
Generation($728.
19)andAuthentication($802.
58),asidefromproductivity.
Forlargeorganizationswith1,000employeesormore,thiscostofbasicpasswordmanagementcanbemorethan$1,500,000eachyear.
HiddenCostsBeyondthetwocostsforbasicpasswordmanagementdemonstratedearlier,thereareotherhiddencostsassociatedwiththepasswordmanagementlifecycle.
Forexample,itisnotuncommonfororganizationstoenforcetimeoutsandscreenlockingtomitigateopportunisticmisuseofanunattendedcomputer[15,24].
Itcreatesconstanttaskinterruptionsandrequiresuserstorecoverfrominterruptionsthatwillalsotranslatetoproductivityloss.
Moreandmoreusers'computingexperienceshappenonmobiledevicessuchaslaptopcomputers,tablets,andsmartphones.
Thecognitiveandbehavioralframeworkwillprovideusafoundationtoexploretheimpactsonpasswordenteringexperiencewithdifferentkeyboardsandlayouts.
Itwillalsoallowustoinvestigatethepotentialinterferencesonusers'musclememoryofawell-practicedpasswordandtheincreaseonrecallerrorsortypingerrorsduetotransitioningfromoneplatformtoanotherorhavingtoswitchbackandforthbetweenplatforms.
Researchisneededtounderstandtheassociatedcostsofusers'mobileauthenticationexperience.
2Totalof240workdaysassuming5daysaweek,52weeks,andminustwovacationweeksand10federalholidays.
ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle1353.
4PositiveAttitudes=BetterSecurityBehaviorsandLessFrustrationIngeneral,usersareconcernedwithsecurity,buttheyoftenareforcedtodeveloplesssecurecopingstrategies(e.
g.
reusepasswords,orwritedownpasswords)whentheyareunabletocomplywithpasswordpoliciesthataretoorestrictiveandinflexibletomatchusers'capabilities[15].
However,inalarge-scalesurveystudy[4],theresearchersfoundthatusers'attitudestowardorganizationalpasswordrequirementsarerelatedtotheirpasswordbehaviorsandexperiencesacrossallthreestagesinthepasswordmanagementlifecycle.
Usersholdingpositiveattitudestowardpasswordrequirementsvaluemoreincreatingcompliantandstrongpasswords,writedownpasswordslessoften,feellessfrustrationwithauthenticationproblems,betterunderstandandrespectthesignificanceofsecurity,ascomparedtouserswithnegativeattitudes.
Thefindingsonattitudesleadustomoreresearchquestionsonsearchingforplausiblemeanstoencouragepositiveuserattitudesandtoprovideusersupportaddressingthenegativethoughts.
4ConclusionArecybersecurityandusabilitytwoparallellinesthatnevermeetOr,aretheycrossroadswheretheintersectionisyettobereachedWebelievethat,thoughitmaynotbeeasilyseen,theintersectiondoesexistamongthetheoretical,technical,andusabilityaspectsofcybersecurity.
Itrequirescollaborationfromresearchersandpractitionerswithmulti-disciplinarybackgroundsinfindingtherightbalancetoreachthatintersectionthatwillprovideacceptablesecurityandusability.
Moreresearchisneededonusers'cognitiveandbehavioralactivitiesregardinginterrelationshipsamongthethreestagesinthepasswordmanagementlifecycle.
Whatcanbedonemoreonthetechnologysidetoensuresecurityandprotectinformationassets,andalleviatetheburdenonuserssotheywillthinkmorepositivelyaboutsecuritymeasuresFutureresearchshoulduseaholisticapproachwiththegoalofprovidingdatatoenablethepolicymakerstomakeinformeddecisionsonsecuritypoliciesthatarebothsecureandusable,andtoprovideguidanceinusersupportandeducationtopromotepositiveattitudes.
References1.
Herley,C.
,vanOorschot,P.
:AResearchAgendaAcknowledgingthePersistenceofPasswords.
IEEESecurity&Privacy10(1),28–36(2012)2.
Florêncio,D.
,Herley,C.
:ALarge-ScaleStudyofWebPasswordHabits.
In:Proceedingsofthe16thInternationalConferenceonWorldWideWeb,pp.
657–666.
ACM(2007)3.
Hoonakker,P.
,Bornoe,N.
,Carayon,P.
:PasswordAuthenticationfromaHumanFactorsPerspective:ResultsofaSurveyamongEnd-Users.
In:ProceedingsoftheHumanFactorsandErgonomicsSocietyAnnualMeeting,vol.
53(6),pp.
459–463.
SAGEPublications(2009)136Y.
-Y.
Choong4.
Choong,Y.
-Y.
T.
M.
,Liu,H.
-K.
:ALarge-ScaleSurveyofEmployees'PasswordBehaviors.
Manuscriptsubmittedforpublication(2014)5.
Goverance,I.
T.
:BoardroomCyberWatch2013–Report(2013),http://www.
itgovernance.
co.
uk/what-is-cybersecurity/boardroom-cyber-watch.
aspx6.
Haskins,W.
:NetworkSecurity:GullibleUsersAretheWeakestLink.
TechNewsWorld(November29,2007),http://www.
technewsworld.
com/story/60520.
html(retrieved)7.
Malenkovich,S.
:10WorstPasswordIdeas(AsSeenIntheAdobeHack).
KasperskyLabDaily(November21,2013),http://blog.
kaspersky.
com/10-worst-password-ideas-as-seen-in-the-adobe-hack/(retrieved)8.
MeriTalk.
:CyberSecurityExperience:SecurityProsfromMars,UsersfromMercury(2013),http://www.
meritalk.
com/cybersecurityexperience(retrieved)9.
Sasse,M.
A.
,Brostoff,B.
,Weirich,D.
:Transformingthe'weakestlink'—ahuman/computerinteractionapproachtousableandeffectivesecurity.
BTTechnologyJournal19(3),122–131(2001)10.
Brown,A.
S.
,Bracken,E.
,Zoccoli,S.
,Douglas,K.
:Generatingandrememberingpasswords.
AppliedCognitivePsychology18(6),641–651(2004)11.
Campbell,J.
,Ma,W.
,Kleeman,D.
:Impactofrestrictivecompositionpolicyonuserpasswordchoices.
Behaviour&InformationTechnology30(3),379–388(2011)12.
Yan,J.
,Blackwell,A.
,Anderson,R.
,Grant,A.
:PasswordMemorabilityandSecurity:EmpiricalResults.
IEEESecurity&Privacy2(5),25–31(2004)13.
Florêncio,D.
,Herley,C.
,Coskun,B.
:DoStrongWebPasswordsAccomplishAnythingIn:Proceedingsofthe2ndUSENIXWorkshoponHotTopicsinSecurity,pp.
1–6(2007)14.
Herley,C.
:SoLong,AndNoThanksfortheExternalities:TheRationalRejectionofSecurityAdvicebyUsers.
In:NSPW2009Proceedingsofthe2009WorkshoponNewSecurityParadigmsWorkshop,pp.
133–144(2009)15.
Inglesant,P.
,Sasse,M.
A.
:TheTrueCostofUnusablePasswordPolicies:PasswordUseintheWild.
In:ProceedingsoftheSIGCHIConferenceonHumanFactorsinComputingSystems,pp.
383–392(2010)16.
Flower,L.
H.
,Hayes,J.
R.
:ACognitiveProcessTheoryofWriting.
CollegeCompositionandCommunication32(4),365–387(1981)17.
Flower,L.
H.
,Hayes,J.
R.
:Problem-solvingstrategiesandthewritingprocess.
CollegeEnglish39(4),449–461(1977)18.
ImervaApplicationDefenseCenter(ADC).
:ConsumerPasswordWorstPractices.
ImpervaWhitePaper(2009),http://www.
imperva.
com/docs/wp_consumer_password_worst_practices.
pdf(retrieved)19.
Zhang,Y.
,Monrose,F.
,Reiter,M.
K.
:TheSecurityofModernPasswordExpiration:AnAlgorithmicFrameworkandEmpiricalAnalysis.
In:Proceedingsofthe17thACMConferenceonComputerandCommunicationsSecurity,pp.
176–186(2010)20.
Proctor,R.
W.
,Lien,M.
-C.
,Vu,K.
-P.
L.
,Schultz,E.
E.
,Salvendy,G.
:Improvingcomputersecurityforauthenticationofusers:Influenceofproactivepasswordrestrictions.
BehaviorResearchMethods,Instruments,&Computers34(2),163–169(2002)21.
Vu,K.
-P.
L.
,Bhargav,A.
,Proctor,R.
W.
:ImposingPasswordRestrictionsforMultipleAccounts:ImpactonGenerationandRecallofPasswords.
In:ProceedingsoftheHumanFactorsandErgonomicsSocietyAnnualMeeting,vol.
47(11),pp.
1331–1335.
SAGEPublications(2003)ACognitive-BehavioralFrameworkofUserPasswordManagementLifecycle13722.
Pratt,M.
K.
:5AnnonyingHelpDeskCalls-AndHowtoBanishThem.
PCWorld(April3,2012),http://www.
pcworld.
com/article/253073/5_annoying_help_desk_calls_and_how_to_banish_them.
html(retrieved)23.
Abel,S.
:IndustryAverageHelpDeskSupportCosts.
TheContentWrangler(April28,2011),http://thecontentwrangler.
com/2011/04/28/industry-average-help-desk-support-costs/(retrieved)24.
Steves,M.
,Chisnell,D.
,Sasse,M.
A.
,Krol,K.
,Theofanos,M.
,Wald,H.
:Report:AuthenticationDiaryStudy.
NISTIR7983.
NationalInstituteofStandardsandTechnology,Gaithersburg,MD(2014)25.
U.
S.
BureauofEconomicAnalysis:NationalIncomeandProductAccounts,Tables6.
6D,WagesandSalariesPerFull-TimeEquivalentEmployeebyIndustry(August7,2013),http://www.
bea.
gov/national/nipaweb(retrieved)26.
Grawemeyer,B.
,Johnson,H.
:Usingandmanagingmultiplepasswords:Aweektoaview.
InteractingwithComputers23(3),256–267(2011)27.
Hayashi,E.
,Hong,J.
I.
:ADiaryStudyofPasswordUsageinDailyLife.
In:ProceedingsoftheSIGCHIConferenceonHumanFactorsinComputingSystems,pp.
2627–2630.
ACM(2011)28.
Keith,M.
,Shao,B.
,Steinbart,P.
:ABehavioralAnalysisofPassphraseDesignandEffectiveness.
JournaloftheAssociationforInformationSystems10(2),63–89(2009)29.
Stanton,B.
,Greene,K.
K.
:CharacterStrings,MemoryandPasswords:WhataRecallStudyCanTellUs.
In:Proceedingsofthe16thInternationalConferenceonHuman-ComputerInteraction(inpress,2014)

美国200G美国高防服务器16G,800元

美国高防服务器提速啦专业提供美国高防服务器,美国高防服务器租用,美国抗攻击服务器,高防御美国服务器租用等。我们的海外高防服务器带给您坚不可摧的DDoS防护,保障您的业务不受攻击影响。HostEase美国高防服务器位于加州和洛杉矶数据中心,均为国内访问速度最快最稳定的美国抗攻击机房,带给您快速的访问体验。我们的高防服务器配有最高层级的DDoS防护系统,每款抗攻击服务器均拥有免费DDoS防护额度,让您...

Megalayer(48元)新增 美国CN2优化线路特价服务器和VPS方案

Megalayer 商家算是新晋的服务商,商家才开始的时候主要是以香港、美国独立服务器。后来有新增菲律宾机房,包括有VPS云服务器、独立服务器、站群服务器等产品。线路上有CN2优化带宽、全向带宽和国际带宽,这里有看到商家的特价方案有增加至9个,之前是四个的。在这篇文章中,我来整理看看。第一、香港服务器系列这里香港服务器会根据带宽的不同区别。我这里将香港机房的都整理到一个系列里。核心内存硬盘IP带宽...

久久网云-目前最便宜的国内,香港,美国,日本VPS云服务器19.9元/月起,三网CN2,2天内不满意可以更换其他机房机器,IP免费更换!。

久久网云怎么样?久久网云好不好?久久网云是一家成立于2017年的主机服务商,致力于为用户提供高性价比稳定快速的主机托管服务,久久网云目前提供有美国免费主机、香港主机、韩国服务器、香港服务器、美国云服务器,香港荃湾CN2弹性云服务器。专注为个人开发者用户,中小型,大型企业用户提供一站式核心网络云端服务部署,促使用户云端部署化简为零,轻松快捷运用云计算!多年云计算领域服务经验,遍布亚太地区的海量节点为...

kaspersky.com为你推荐
8080端口路由器如何开8080端口微信回应封杀钉钉微信大封杀什么时候结束地图应用看卫星地图哪个手机软件最好。firetrap牛仔裤的四大品牌是那几个啊?关键字关键字和一般标识符的区别百度关键词价格查询在百度设置关键字是怎么收费的曹谷兰曹谷兰事件 有吧友知道吗www.yahoo.com.hk香港的常用网站haole16.com国色天香16 17全集高清在线观看 国色天香qvod快播迅雷下载地址66smsm.comffff66com手机可以观看视频吗?
花生壳域名贝锐 草根过期域名 bbr windows主机 gomezpeer 京东云擎 新站长网 华为4核 数字域名 免费个人空间 赞助 129邮箱 免费美国空间 umax120 免费网络 万网注册 winds asp简介 回程 29美元 更多