skip to main content
10.1145/1837110.1837113acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Encountering stronger password requirements: user attitudes and behaviors

Published:14 July 2010Publication History

ABSTRACT

Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change in the Carnegie Mellon University (CMU) computing services password policy that required users to change their passwords. Through our survey of 470 CMU computer users, we collected data about behaviors and practices related to the use and creation of passwords. We also captured users' opinions about the new, stronger policy requirements. Our analysis shows that, although most of the users were annoyed by the need to create a complex password, they believe that they are now more secure. Furthermore, we perform an entropy analysis and discuss how our findings relate to NIST recommendations for creating a password policy. We also examine how users answer specific questions related to their passwords. Our results can be helpful in designing better password policies that consider not only technical aspects of specific policy rules, but also users' behavior in response to those rules.

References

  1. M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233--249, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. E. Burr, D. F. Dodson, and W. T. Polk. Electronic authentication guideline. Technical report, National Institute of Standards and Technology, 2006.Google ScholarGoogle Scholar
  3. D. Florencio and C. Herley. A large-scale study of web password habits. In International conference on World Wide Web, page 666, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. F. Gehringer. Choosing passwords: security and human factors. International Symposium on Technology and Society, 2002, pages 369--373, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  5. D. Hart. Attitudes and practices of students towards password security. Journal of Computing Sciences in Colleges, 23(5):169--174, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Herley. So long, and no thanks for the externalities: the rational rejection of security advice by users. In New Security Paradigms Workshop, pages 133--144, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Inglesant and M. A. Sasse. The true cost of unusable password policies: password use in the wild. In ACM Conference on Human Factors in Computing Systems 2010, pages 383--392, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Keith, B. Shao, and P. J. Steinbart. The usability of passphrases for authentication: An empirical field study. International journal of human-computer studies, 65(1):17--28, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Komanduri and D. R. Hutchings. Order and entropy in picture passwords. In Graphics Interface, pages 115--122, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Kuo, S. Romanosky, and L. F. Cranor. Human selection of mnemonic phrase-based passwords. In Symposium on Usable Privacy and Security, pages 67--78, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Leyden. Office workers give away passwords for a cheap pen. The Register, 2003.Google ScholarGoogle Scholar
  12. J. L. Massey. Guessing and entropy. In IEEE International Symposium on Information Theory, page 204, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  13. G. Miller. Note on the bias of information estimates. Information Theory in Psychology: Problems and Methods, pages 95--100, 1955.Google ScholarGoogle Scholar
  14. R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers, 34(2):163--169, 2002.Google ScholarGoogle Scholar
  15. RSA. Rsa security survey reveals multiple passwords creating security risks and end user frustration. http://www.rsa.com/press_release.aspx?id=6095, September 2010.Google ScholarGoogle Scholar
  16. SafeNet. 2004 annual password survey results. SafeNet, 2005.Google ScholarGoogle Scholar
  17. M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link'---a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122--131, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Schneier. Write down your password. http://www.schneier.com/blog/archives/2005/06/write_down_your.html, June 2005.Google ScholarGoogle Scholar
  19. C. E. Shannon. A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 1949. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Shay and E. Bertino. A comprehensive simulation tool for the analysis of password policies. International Journal of Information Security, 8(4):275--289, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Shay, A. Bhargav-Spantzel, and E. Bertino. Password policy simulation and analysis. In ACM workshop on Digital identity management, pages 1--10, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. C. Summers and E. Bosworth. Password policy: the good, the bad, and the ugly. In Winter international synposium on Information and communication technologies, pages 1--6, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K.-P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. B. Tai, and J. Cook. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies, 65(8):744--757, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Zviran and W. J. Haga. Password security: an empirical study. Journal of Management Information Systems, 15(4):161--185, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Encountering stronger password requirements: user attitudes and behaviors

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security
          July 2010
          236 pages
          ISBN:9781450302647
          DOI:10.1145/1837110

          Copyright © 2010 Copyright is held by the author/owner.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 July 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader