The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
An Evaluation of User Password Practice
Abstract
Maintaining the security of information systems and associated data resources is vital if an organization is to minimize losses. Access controls are the first line of defense in this process. The primary function of authentication controls is to ensure that only authorized users have access to information systems and electronic resources. Password-based systems remain the predominant means of user authentication despite viable authentication alternatives. Research suggests that password-based systems are often compromised by poor user security practices. This chapter presents the results of a survey of 884 computer users that examines user practice in creating and reusing password keys, and reports the findings on user password composition and security practices for email accounts. Despite a greater awareness of security issues, the results show that many users still select and reuse weak passwords keys that are based on dictionary words and other meaningful information.
Related Content
Robin Throne, Michalina Hendon.
© 2024.
19 pages.
|
Fatmanur Özen, Aytekin Demircioğlu.
© 2024.
22 pages.
|
Kübra Kırca Demirbaga.
© 2024.
17 pages.
|
Gulcin Karadeniz.
© 2024.
15 pages.
|
Glenn Dawes.
© 2024.
20 pages.
|
Aylin Akinlar.
© 2024.
29 pages.
|
Ziaul Islam Jewel.
© 2024.
15 pages.
|
|
|