Password security: Password behavior analysis at a small university

Mohammed Awad, Zakaria Al-Qudah, Sahar Idwan, Abdul Halim Jallad

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

No matter how sophisticated and advanced an organization's security system is, it remains vulnerable due to the human factor. In this paper, we conducted a survey to analyze the patterns used by the faculty, staff, and students when generating passwords at a small sized university. We found that users are not as aware of security requirements and practices as they think. Moreover, the vast majority of users' passwords are breakable within days or shorter. Interestingly, we found that using numbers and uppercase letters is common among users. However, numbers are mostly used at the end of the passwords and uppercase letters are mostly used at the beginning of passwords. The existence of such trends makes it easier for attackers to generate more effective dictionaries. Based on the analysis in this paper, we make recommendations to IT personnel and the general public to harden the security of their passwords.

Original languageEnglish
Title of host publication2016 5th International Conference on Electronic Devices, Systems and Applications, ICEDSA 2016
PublisherIEEE Computer Society
ISBN (Electronic)9781509053063
DOIs
Publication statusPublished - Jan 13 2017
Externally publishedYes
Event5th International Conference on Electronic Devices, Systems and Applications, ICEDSA 2016 - Ras Al Khaimah, United Arab Emirates
Duration: Dec 6 2016Dec 8 2016

Publication series

NameInternational Conference on Electronic Devices, Systems, and Applications
ISSN (Print)2159-2047
ISSN (Electronic)2159-2055

Other

Other5th International Conference on Electronic Devices, Systems and Applications, ICEDSA 2016
Country/TerritoryUnited Arab Emirates
CityRas Al Khaimah
Period12/6/1612/8/16

Keywords

  • Awareness
  • Password
  • Security
  • Strength

ASJC Scopus subject areas

  • Computer Science Applications
  • Hardware and Architecture
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Password security: Password behavior analysis at a small university'. Together they form a unique fingerprint.

Cite this