Skip to main content

2020 | OriginalPaper | Buchkapitel

Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining

verfasst von : Joakim Kävrestad, Marcus Nohlberg

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we describe and evaluate how the learning framework ContextBased MicroTraining (CBMT) can be used to assist users to create strong passwords. Rather than a technical enforcing measure, CBMT is a framework that provides information security training to users when they are in a situation where the training is directly relevant. The study is carried out in two steps. First, a survey is used to measure how well users understand password guidelines that are presented in different ways. The second part measures how using CBMT to present password guidelines affect the strength of the passwords created. This experiment was carried out by implementing CBMT at the account registration page of a local internet service provider and observing the results on user-created passwords. The results of the study show that users presented with passwords creation guidelines using a CBMT learning module do understand the password creation guidelines to a higher degree than other users. Further, the experiment shows that users presented with password guidelines in the form of a CBMT learning module do create passwords that are longer and more secure than other users. The assessment of password security was performed using the zxcvbn tool, developed by Dropbox, that measures password entropy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kävrestad, J., Eriksson, F., Nohlberg, M.: Understanding passwords–a taxonomy of password creation strategies. Inf. Comput. Secur. 27(3), 453–467 (2019)CrossRef Kävrestad, J., Eriksson, F., Nohlberg, M.: Understanding passwords–a taxonomy of password creation strategies. Inf. Comput. Secur. 27(3), 453–467 (2019)CrossRef
2.
Zurück zum Zitat Wang, C., Jan, S.T., Hu, H., Bossart, D., Wang, G.: The next domino to fall: empirical analysis of user passwords across online services. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. ACM (2018) Wang, C., Jan, S.T., Hu, H., Bossart, D., Wang, G.: The next domino to fall: empirical analysis of user passwords across online services. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. ACM (2018)
3.
Zurück zum Zitat Woods, N., Siponen, M.: Too many passwords? How understanding our memory can increase password memorability. Int. J. Hum. Comput. Stud. 111, 36–48 (2018)CrossRef Woods, N., Siponen, M.: Too many passwords? How understanding our memory can increase password memorability. Int. J. Hum. Comput. Stud. 111, 36–48 (2018)CrossRef
4.
Zurück zum Zitat Brumen, B.: Security analysis of game changer password system. Int. J. Hum. Comput. Stud. 126, 44–52 (2019)CrossRef Brumen, B.: Security analysis of game changer password system. Int. J. Hum. Comput. Stud. 126, 44–52 (2019)CrossRef
5.
Zurück zum Zitat Shay, R., et al.: Designing password policies for strength and usability. ACM Trans. Inf. Syst. Secur. 18(4), 1–34 (2016)CrossRef Shay, R., et al.: Designing password policies for strength and usability. ACM Trans. Inf. Syst. Secur. 18(4), 1–34 (2016)CrossRef
6.
Zurück zum Zitat Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready?: Quantifying 2FA adoption. In: Proceedings of the Eighth European Workshop on System Security. ACM (2015) Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready?: Quantifying 2FA adoption. In: Proceedings of the Eighth European Workshop on System Security. ACM (2015)
8.
Zurück zum Zitat Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium (1999) Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium (1999)
9.
Zurück zum Zitat Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of the 2001 Workshop on New Security Paradigms. ACM (2001) Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of the 2001 Workshop on New Security Paradigms. ACM (2001)
10.
Zurück zum Zitat Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65–78 (2015)CrossRef Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65–78 (2015)CrossRef
11.
Zurück zum Zitat Kävrestad, J., Skärgård, M., Nohlberg, M.: Users perception of using CBMT for information security training. In: Human Aspects of Information Security & Assurance (HAISA 2019) Nicosia (2019) Kävrestad, J., Skärgård, M., Nohlberg, M.: Users perception of using CBMT for information security training. In: Human Aspects of Information Security & Assurance (HAISA 2019) Nicosia (2019)
12.
Zurück zum Zitat Kävrestad, J., Nohlberg, M.: Using context based micro training to develop OER for the benefit of all. In: Proceedings of the 15th International Symposium on Open Collaboration. ACM (2019) Kävrestad, J., Nohlberg, M.: Using context based micro training to develop OER for the benefit of all. In: Proceedings of the 15th International Symposium on Open Collaboration. ACM (2019)
13.
Zurück zum Zitat Hedin, A.: Lärande på hög nivå. Uppsala Universitet (2006) Hedin, A.: Lärande på hög nivå. Uppsala Universitet (2006)
14.
Zurück zum Zitat Knowles, M.S.: Andragogy in Action: Applying Principles of Adult Learning. Jossey-Bass, San Farancisco (1984) Knowles, M.S.: Andragogy in Action: Applying Principles of Adult Learning. Jossey-Bass, San Farancisco (1984)
15.
Zurück zum Zitat Herrington, J., Oliver, R.: Critical characteristics of situated learning: implications for the instructional design of multimedia (1995) Herrington, J., Oliver, R.: Critical characteristics of situated learning: implications for the instructional design of multimedia (1995)
16.
Zurück zum Zitat Parsons, K., Butavicius, M., Lillie, M., Calic, D., McCormac, A., Pattinson, M.: Which individual, cultural, organisational and inerventional factors explain phishing resilience? In: Twelfth International Symposium on Human Aspects of Information Security & Assurance, Dundee, Scotland, UK. University of Plymouth (2018) Parsons, K., Butavicius, M., Lillie, M., Calic, D., McCormac, A., Pattinson, M.: Which individual, cultural, organisational and inerventional factors explain phishing resilience? In: Twelfth International Symposium on Human Aspects of Information Security & Assurance, Dundee, Scotland, UK. University of Plymouth (2018)
17.
Zurück zum Zitat Wang, M., Xiao, J., Chen, Y., Min, W.: Mobile learning design: the LTCS model. In: 2014 International Conference on Intelligent Environments (IE). IEEE (2014) Wang, M., Xiao, J., Chen, Y., Min, W.: Mobile learning design: the LTCS model. In: 2014 International Conference on Intelligent Environments (IE). IEEE (2014)
18.
Zurück zum Zitat McLoughlin, C., Lee, M.: Mapping the digital terrain: new media and social software as catalysts for pedagogical change. Ascilite Melbourne (2008) McLoughlin, C., Lee, M.: Mapping the digital terrain: new media and social software as catalysts for pedagogical change. Ascilite Melbourne (2008)
19.
Zurück zum Zitat Bruck, P.A., Motiwalla, L., Foerster, F.: Mobile learning with micro-content: a framework and evaluation. In: Bled eConference, vol. 25 (2012) Bruck, P.A., Motiwalla, L., Foerster, F.: Mobile learning with micro-content: a framework and evaluation. In: Bled eConference, vol. 25 (2012)
20.
Zurück zum Zitat Koedinger, K.R., Kim, J., Jia, J.Z., McLaughlin, E.A., Bier, N.L.: Learning is not a spectator sport: doing is better than watching for learning from a MOOC. In: 2015 Proceedings of the Second ACM Conference on Learning@ Scale. ACM (2015) Koedinger, K.R., Kim, J., Jia, J.Z., McLaughlin, E.A., Bier, N.L.: Learning is not a spectator sport: doing is better than watching for learning from a MOOC. In: 2015 Proceedings of the Second ACM Conference on Learning@ Scale. ACM (2015)
21.
Zurück zum Zitat Boud, D., Feletti, G.: The Challenge of Problem-Based Learning. Psychology Press, Routledge (2013)CrossRef Boud, D., Feletti, G.: The Challenge of Problem-Based Learning. Psychology Press, Routledge (2013)CrossRef
22.
Zurück zum Zitat Kävrestad, J., Nohlberg, M.: Online fraud defence by context based micro training. In: HAISA (2015) Kävrestad, J., Nohlberg, M.: Online fraud defence by context based micro training. In: HAISA (2015)
23.
Zurück zum Zitat Werme, J.: Security awareness through micro-training: an initial evaluation of a context based micro-training framework (2014) Werme, J.: Security awareness through micro-training: an initial evaluation of a context based micro-training framework (2014)
24.
Zurück zum Zitat Furnell, S., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1–9 (2018)CrossRef Furnell, S., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1–9 (2018)CrossRef
28.
Zurück zum Zitat Grassi, P., et al.: NIST special publication 800–63b: digital identity guidelines. National Institute of Standards and Technology (NIST) (2017) Grassi, P., et al.: NIST special publication 800–63b: digital identity guidelines. National Institute of Standards and Technology (NIST) (2017)
30.
Zurück zum Zitat ISO/IEC, Information technology - Security techniques - Code of practice for information security controls. ISO/IEC (2017) ISO/IEC, Information technology - Security techniques - Code of practice for information security controls. ISO/IEC (2017)
32.
Zurück zum Zitat Lincoln, Y.S., Guba, E.G.: Naturalistic Inquiry, vol. 75. Sage (1985) Lincoln, Y.S., Guba, E.G.: Naturalistic Inquiry, vol. 75. Sage (1985)
33.
Zurück zum Zitat Schrittwieser, S., Mulazzani, M., Weippl, E.: Ethics in security research which lines should not be crossed? In: Security and Privacy Workshops (SPW), IEEE (2013) Schrittwieser, S., Mulazzani, M., Weippl, E.: Ethics in security research which lines should not be crossed? In: Security and Privacy Workshops (SPW), IEEE (2013)
34.
Zurück zum Zitat Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: USENIX Security Symposium (2016) Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: USENIX Security Symposium (2016)
35.
Zurück zum Zitat XDCD Carnavalet, Mannan, M.: A large-scale evaluation of high-impact password strength meters. ACM Trans. Inf. Syst. Secur. (TISSEC) 18(1), 1 (2015) XDCD Carnavalet, Mannan, M.: A large-scale evaluation of high-impact password strength meters. ACM Trans. Inf. Syst. Secur. (TISSEC) 18(1), 1 (2015)
37.
Zurück zum Zitat Siponen, M.T.: Five dimensions of information security awareness. SIGCAS Comput. Soc. 31(2), 24–29 (2001)CrossRef Siponen, M.T.: Five dimensions of information security awareness. SIGCAS Comput. Soc. 31(2), 24–29 (2001)CrossRef
38.
Zurück zum Zitat Mendes, M., Pala, A.: Type I error rate and power of three normality tests. Pak. J. Inf. Technol. 2(2), 135–139 (2003)CrossRef Mendes, M., Pala, A.: Type I error rate and power of three normality tests. Pak. J. Inf. Technol. 2(2), 135–139 (2003)CrossRef
39.
Zurück zum Zitat McKnight, P.E., Najab, J.: Mann-Whitney U test. Corsini Encycl. Psychol. 1 (2010) McKnight, P.E., Najab, J.: Mann-Whitney U test. Corsini Encycl. Psychol. 1 (2010)
Metadaten
Titel
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
verfasst von
Joakim Kävrestad
Marcus Nohlberg
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-58201-2_7