Passwords to Absolutely Avoid

被引:0
|
作者
Violettas, George E. [1 ]
Papadopoulos, Kyriakos [2 ]
Tasioudis, Christos [2 ]
机构
[1] Tech Training Coll, ICT Dept, Riyadh, Saudi Arabia
[2] Alexander Technol Educ Inst Thessaloniki ATEITH, IT Dept, Thessaloniki, Greece
关键词
Password; Security; Study; Web Sites;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the password habits of web users, particularly in Greece. A study was conducted online to ask users questions about the length of the password they use today, in how many web sites they use the same password, whether they use personal data while constructing their passwords and if they ever used as a password some of trivial words. They were also asked whether they reveal their password(s) to friends and/or family and if they ever realized that their password was exposed or revealed to an attacker and the measures they took after that. Additionally, an extended literature review about password habits and effectiveness regarding length and complexity is included. At the end of the paper, for first time in Greece, there is a list of the 100 passwords that Greek users should absolutely avoid using due to the ease of guessing or weak complexity, short length or simply because they exist in every dictionary used for password attacks in the wild.
引用
收藏
页码:60 / 68
页数:9
相关论文
共 50 条
  • [1] What must I absolutely avoid? Tips from the perspective of the medical lawyer
    Jorzig, Alexandra
    [J]. GYNAKOLOGIE, 2023, 56 (01): : 22 - 27
  • [2] Passwords
    Lassalle, J
    [J]. EUROPE-REVUE LITTERAIRE MENSUELLE, 2006, (924) : 232 - 248
  • [3] PASSWORDS
    DENNING, PJ
    [J]. AMERICAN SCIENTIST, 1992, 80 (02) : 117 - 120
  • [4] Passwords
    Fabre G, Sylvie
    [J]. EUROPE-REVUE LITTERAIRE MENSUELLE, 2014, (1022) : 342 - 344
  • [5] PASSWORDS
    Frank, Gordon
    [J]. COMPUTER, 2009, 42 (06) : 6 - 6
  • [6] Passwords.
    Coulter, BG
    [J]. CANADIAN REVIEW OF SOCIOLOGY AND ANTHROPOLOGY-REVUE CANADIENNE DE SOCIOLOGIE ET D ANTHROPOLOGIE, 2005, 42 (01): : 111 - 113
  • [7] Picture Passwords Superiority and Picture Passwords Dictionary Attacks
    Golofit, Krzysztof
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 179 - 183
  • [8] Rethinking Passwords
    Cheswick, William
    [J]. COMMUNICATIONS OF THE ACM, 2013, 56 (02) : 40 - 44
  • [9] Haptic Passwords
    Yan, Junjie
    Huang, Kevin
    Bonaci, Tamara
    Chizeck, Howard J.
    [J]. 2015 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2015, : 1194 - 1199
  • [10] PASSWORDS AND THEIR GENERATION
    PILLER, E
    [J]. ANGEWANDTE INFORMATIK, 1989, (01): : 3 - 13