SwePub
Sök i LIBRIS databas

  Utökad sökning

id:"swepub:oai:DiVA.org:hj-62741"
 

Sökning: id:"swepub:oai:DiVA.org:hj-62741" > Understanding passw...

Understanding passwords – a taxonomy of password creation strategies

Kävrestad, Joakim, 1989- (författare)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningscentrum för Informationsteknologi,Informationsystem, Information Systems
Eriksson, Fredrik (författare)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningscentrum för Informationsteknologi,Informationsystem, Information Systems
Nohlberg, Marcus, 1976- (författare)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningscentrum för Informationsteknologi,Informationsystem, Information Systems
 (creator_code:org_t)
Emerald Group Publishing Limited, 2019
2019
Engelska.
Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 27:3, s. 453-467
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remains the most common type of authentication. As long and complex passwords are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable them to remember their passwords. This paper aims to present a taxonomy of those password creation strategies in the form of a model describing various strategies used to create passwords. Design/methodology/approach The study was conducted in a three-step process beginning with a short survey among forensic experts within the Swedish police. The model was then developed by a series of iterative semi-structured interviews with forensic experts. In the third and final step, the model was validated on 5,000 passwords gathered from 50 different password databases that have leaked to the internet. Findings The result of this study is a taxonomy of password creation strategies presented as a model that describes the strategies as properties that a password can hold. Any given password can be classified as holding one or more of the properties outlined in the model. Originality/value On an abstract level, this study provides insight into password creation strategies. As such, the model can be used as a tool for research and education. It can also be used by practitioners in, for instance, penetration testing to map the most used password creation strategies in a domain or by forensic experts when designing dictionary attacks.

Ämnesord

NATURVETENSKAP  -- Data- och informationsvetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences (hsv//eng)

Nyckelord

Computer security
Strategies
Passwords
Classification
Categorization
Information Systems
Informationssystem (IS)

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy