Investigation into the Security Risks of Bad Password Habits, the Adequacy of this Method and Student Attitudes Surrounding these Issues.
Cardiff Metropolitan University
MetadataShow full item record
Password authentication is one of the most commonly used forms of user security. Passwords are a fundamental line of defence when enforcing sensitive data that is passed around the web. Cyber-attacks on passwords can have damaging and lasting effects on user privacy and security, ranging over mediums from social media to online shopping. Considering the scale of its implementation and the potential dangers associated with password authentication, it is important to be well versed regarding the risks and responsibilities that adhere to passwords. Through review of secondary sources the study has revealed countless vulnerabilities that passwords are highly susceptible to. These vulnerabilities range from password cracking to the psychology of how users manage passwords. Literature also states that passwords have the potential to be strong and secure and this is provided they are implemented effectively, for example, they exist within a broad range of character permutations. However, certain limitations, such as brain capacity, prevent this from being something that is easily implemented. In order to develop new research a questionnaire has been conducted to uncover and analyse good and bad password practices that are currently present in university students, with the goal of devising a balanced criticism of password authentication. Results show that users are aware of some of the risks that apply to passwords and are knowledgeable surrounding good password practices and protocol. However, students lack the ability to apply good password practices whilst understanding the risks. The study also found that student’s opinions of strong passwords are distorted and what students believe to be strong qualities in a passwords are in fact weak. Furthermore students present difficulty in remembering the quantities of passwords they are required to create, further diminishing the usability of this authentication system.
Showing items related by title, author, subject and abstract.
Risks: Hacking, Identity Theft and Burglary that are associated with students (aged 18-24) in sharing personal data through Social Media Applications. Donoghue, Benjamin (Cardiff Metropolitan University, 2017-04)As social media sites like Facebook, Twitter and Instagram are becoming more popular, so does the increase in users. With more individuals joining these sites, the associated risks will rise. This study will research the ...
Rahim, Mohammad Rafie (Cardiff Metropolitan University, 2016-04)Abstract Biometric authentication systems use physical traits of a user in order to give the user access control. Previously the most common and widely method of securing access control is done via knowledge based ...
Esekhaigbe, Ebanehita Jude (Cardiff Metropolitan University, 2016-04)ABSTRACT Biometrics is an exceptional strategy used to recognize people by region organic describes. As of late biometrics are showing up all over from home, schools, working environment and banks. This identification ...