Ask a question from expert

Ask now

Information Security Assignment Solution

14 Pages3645 Words144 Views
   

Added on  2021-06-15

Information Security Assignment Solution

   Added on 2021-06-15

BookmarkShareRelated Documents
INFORMATION SECURITY 1Information Security ConferencesBy (Name)The Name of the Class (Course)Professor (Tutor)The Name of the School (University)The City and where it is locatedThe Date
Information Security Assignment Solution_1
INFORMATION SECURITY 2Information Security ConferencesPart A: AcademicsA Review of a 2017 AMC Conference on Computer and Communication Security Paper: Let’sGo in for a Closer Look: Observing Passwords in Their Natural Habitat.With text passwords increasingly becoming omnipresent in our present day world that ischaracterized by massive data breaches and information systems compromise, specifically whendata falls in hands, malicious-intended people, the world security researchers community hasbeen in a never-ending journey, conducting researches, creating awareness, and trying to helpand coerce the general public to create password that attackers will find hard to crack, but willremain easy for the legitimate users- to remember[CITATION Ann99 \l 1033 ].Reports from text password scalability and usability researches have over the yearsindicated that no any users want to fall prey to the attackers, and in fact, they always have ingood faith[ CITATION Cyn06 \l 1033 ], and in the security interests of their information, tried withno success to follow the existing password creation and management guidelines[ CITATION Cor09 \l 1033 ]. This paper, presented to the AMC conference on Computer and Communication Securityheld in Dallas TX, USA in October 2017 by Sarah Peraman et al is a masterpiece of its own kindposition in the today's world of security. The team takes its audience through the very manychallenges that the public faces when trying to create strong passwords as per the passwordmanagement guidelines[ CITATION USC16 \l 1033 ]. As a way of protecting users' accounts fromlooming attacks, the guidelines require the creation of passwords that are not less than eight
Information Security Assignment Solution_2
INFORMATION SECURITY 3characters and with no guessable words and/or characters[ CITATION Sar17 \l 1033 ]. Additionally,users are advised to create passwords that are distinct for all of their accounts, all of whichshould be randomly chosen. The main challenge is however posed by the many accounts thatpresent-day internet users have further fuelled by password complexity requirement thus makingany efforts to an efficient password management practice an unrealistic demand for the humanmemory- one cannot create and memorize the distinct (effective) passwords for all theiraccounts.As a research paper, the team went an extra mile to study password managementpractices that lead to the design of secure systems and systems' interfaces through a deeper lookinto the extent in which internet users use passwords over the internet in their daily activities andthe manner in which they reuse them (Security Behavior Observing), unlike the traditionalresearchers that have always been focused, limited to and dependent on indirect measurements,and surveys in reports. To enhance the originality, authentication, accuracy and validity of theproject, data and results, the project team used a longitudinal and a comprehensive study, aprocess in which they carefully examined passwords and password related behaviors, approvaland authentication from an ethics review board, and computer related information such asprivacy and security of web-based extensions. Furthermore, in order to understand how userscreate guessing attack-resistant passwords, the team installed a neural network on users’machines so as to compute and record strengths of such passwords[ CITATION Wil16 \l 1033 ].From their study, it was realized that a greater population of the participants found itterribly hard to create and recall different passwords, for different account anddomains[ CITATION Ric16 \l 1033 ]. As such, they resorted to partial and exact password re-
Information Security Assignment Solution_3
INFORMATION SECURITY 4use[ CITATION Din07 \l 1033 ]. While previous studies had focused on partial re-use only, thispaper brought the world of computer security to the knowledge of exact password reuse hittingto a 12% of the total participants. They further argued that many are the people and internet userswho have clusters of password reuse- partially or exactly, a condition that in a very probable waypredisposes them to security threats across all boards. Amazingly, some confessed to havingmultiple accounts that shared the same passwords! While the team noted that stronger had passwords had a low probability of being reused,it was evident that such passwords were only created for accounts that respective users thoughtto be most important to them and were found to be not only satisfactorily long but also containeda mixture of special characters, alphabets and numerical digits. On the other side of the flip, anyshort passwords with special characters and digits are likely to be reused most, thanks to theusers perception that such password is more secure, little do they know that their security statusis easily compromised at such situations especially when the passwords are placed in an easilyguessable manner and/or locations. In addition to this, the report further pointed to the highpercentage of password reuse on government websites and related systems- in a pretext that thesesystems have stricter password policies and that they are more secure, least do we understandthat these sites are the most vulnerable, and a greater target.On password autofill functionality, the paper suggests that 19% of the participantsreported having installed password managers but could not ascertain whether the passwordautofill was native browser-based or were done by the third-party password managers.Additionally, the study did not ascertain for the population accessing password managers fromtheir mobile phones.
Information Security Assignment Solution_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Attacking and Protecting Password
|9
|1932
|469

Information System Security in Facebook
|6
|2540
|177

Identification of the factors and impact of multifactor authentication in improving the user centric security
|10
|2117
|489

Security Threats in Cloud and Prevention - Doc
|5
|589
|55

ICT Ethical Hacking Exploits
|11
|2470
|1

Biometric for Authentication
|7
|3210
|268