Abstract
Text-based password is widely used by many systems to authenticate their legitimate users. Several studies had shown that users, including professional people, still follow bad habits while dealing with passwords. The users like to use easy passwords to remember the password, by ignoring the security risks. Some users reuse the same password to log into several accounts and even share the password with others without taking any security precautions. A study was conducted to analyze the users’ awareness of the importance of password protection by providing some questionnaires. The aim was to measure the awareness level based on several measurements. It was found that a large proportion of users are preferred to choose an easy-to-remember password compared to having a stronger password in protecting their account. It is recommended that users at all levels have to be educated in terms of their password security and changes in the users’ behavior are very important.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Henry, M. (2013). Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal, 25(2), 38–45.
Khalaf, T. E., & Sulaiman, N. (2015). A new biometric template protection based on secure data hiding approach. ARPN Journal of Engineering and Applied Science, 10, 480–487.
Gupta, P., & Bhagat, J. (2018). Image steganography using LSB substitution facilitated by shared password. International Conference on Innovative Computing and Communications, 1, 369–376.
Helkala, K., & Bakas, T. H. (2013). National password security survey: Results. EISMC, 23–33.
Talib, S., Clarke, N. L., & Furnell, S. M. (2010). An analysis of information security awareness within home and work environments. In Availability, Reliability, and Security. International Conference ARES'10 (pp. 196–203).
Yu1, X., & Liao, Q.: Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization. International Journal of Information Security, 18, 647–663.
Woods, N., & Siponen, M. (2019). Improving password memorability, while not inconveniencing the user. International Journal of Human Computer Studies, 128, 61–71.
Habib, H., Colnago, J., Melicher,W., Ur, B., Segreti, S., Bauer, L., Christin, N., & Cranor, L. (2017). Password creation in the presence of blacklists. USEC.
Komanduri, S., Shay, R., Cranor, L. F., Herley, C., Schechter, S., Komanduri, S., & Cranor, L. F. (2014). Telepathwords: Preventing weak passwords by reading users’ minds. In USENIX Security Symposium (pp. 591–606).
Awad, M., Al-Qudah, Z., Idwan, S., & Jallad, A. H. (2019). evaluating password behavior at a small university. Journal of Computer Science, 15(1), 1–9.
Tihanyi, N., Kovacs, A., Vargha, G., & Lenart, A. (2015). Unrevealed patterns in password data bases part one: Analyses of cleartext passwords. In Technology and Practice of Passwords: International Conference on Passwords (pp. 89–101).
Korkmaz, I., & Dalkilic, M. E. (2010). The weak and the strong password preferences: A case study on Turkish users. In The 3rd international conference on Security of information and networks (pp. 56–61). ACM.
Fagan, M., Albayram, Y., Hasan Khan, M. F., & Buck, R. (2017). An Investigation into users’ considerations towards using password managers. Human-Centric Computing and Information Sciences, 7–12.
Yıldırım, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18, 741–759.
Wash, R., Rader, E., Berman, R., & Wellmeret, Z. (2016). Understanding password choices: How frequently entered passwords are re-used across websites. In Symposium on Usable Privacy and Security (pp. 175–188)
Poornachandran, P., Nithun, M., Pal, S., Ashok, A., & Ajayan, A. (2016). Password reuse behavior: how massive online data breaches impacts personal data in Web. In Innovations in Computer Science and Engineering (pp. 199–210). Singapore: Springer.
Ur, B., Bees, J., Segreti, S. M., Bauer, L., Christin, N., & Cranor, L. F. (2016). Do users’ perceptions of password security match reality? In Conference on Human Factors in Computing Systems.
Solic, K., Ocevcic, H., Blazevic, D., Awareness, S., & Influence, H. (2015). Survey on password quality and confidentiality. Automatika, 56, 69–75.
Almehmadi, T., & Alsolami, F. (2019). Password security in organizations: User attitudes and behaviors regarding password strength. In The 16th International Conference on Information Technology-New Generations.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sulaiman, N. (2022). A Study on Password Security Awareness in Constructing Strong Passwords. In: Khanna, A., Gupta, D., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1387. Springer, Singapore. https://doi.org/10.1007/978-981-16-2594-7_35
Download citation
DOI: https://doi.org/10.1007/978-981-16-2594-7_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2593-0
Online ISBN: 978-981-16-2594-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)