Saturday, December 14, 2024
spot_img

Stringent password can prevent fraud

Date:

Share post:

spot_img
spot_img

Is it exhausting for you to come up with a new password every time you make a new account somewhere?
Well, it turns out that the all-too-common practice of using the same email address/password combination to log into multiple websites can be damaging.
According to a recent study, the practice can cause more harm to the employers with many users and valuable assets protected by passwords, like in universities.
“If someone uses their university email address and passphrase to sign up for, say, LinkedIn, and LinkedIn is breached by cybercriminals, that would mean their university password is sitting on the web for everyone to see,” said Indiana University’s Dan Calarco, co-author of the study.
“We found that requiring longer and more complicated passwords resulted in a lower likelihood of password reuse,” the authors write in the paper, Factors Influencing Password Reuse: A Case Study.
The authors are Jacob Abbott, an IU Bloomington Ph.D. student; Daniel Calarco, chief of staff for the IU Office of the Vice President for IT and CIO; and L. Jean Camp, a professor in the IU Bloomington School of Informatics, Computing and Engineering.
The group presented their findings at the TPRC46: Research Conference on Communications, Information and Internet Policy in Washington, D.C.
To investigate the impact of policy on password reuse, the study analyzed password policies from 22 different U.S. universities, including their home institution, IU.
Next, they extracted sets of emails and passwords from two large data sets that were published online and contained over 1.3 billion email addresses and password combinations.
Based on email addresses belonging to a university’s domain, passwords were compiled and compared against a university’s official password policy.
The study found that stringent password rules significantly lower a university’s risk of personal data breaches.
“Our paper shows that passphrase requirements such as a 15-character minimum length deter the vast majority of IU users (99.98 percent) from reusing passwords or passphrases on other sites,” they write. “Other universities with fewer password requirements had reuse rates potentially as high as 40 percent.”
Their analysis found that IU performed the best of all 22 universities — and had the most extensive requirements. The authors could not legally test whether credentials were actually valid; instead, they examined whether passwords could potentially be valid given public password requirements such as password length, complexity and other requirements.
“IU has worked with security and usability faculty to design our password policies, with the result being policies that value people’s time while mitigating risk,” Camp said.
“The length and complexity are balanced by the extended period before new passwords must be generated and the use of a longer authentication time window for applications. Indiana University’s rollout of two-factor authentication is similarly a model.”
Multi-factor authentication is becoming more common and usable. IU, for example, employs Two-Step Login.
With the potential benefits of reducing the risk of password reuse, multi-factor authentication may be a viable alternative to changing the length and/or complexity of password policies.
“Our recommendations are not only applicable for universities but also can be used by other organizations, services or applications,” they write. (ANI)

spot_img
spot_img

Related articles

40 Indian startups secure over $787 million in funding this week

New Delhi, Dec 14: In a significant week for the Indian startup ecosystem, nearly 40 startups secured more...

PM Modi’s appeal to buy Khadi garments leads to huge demand in Bihar’s Samastipur

New Delhi, Dec 14: After Prime Minister Narendra Modi's appeal to support the Khadi industry by buying its...

NDA backs ‘One Nation, One Election’; Oppn calls it attack on federalism

New Delhi, Dec 14: The Centre's decision to introduce the 'One Nation, One Election' Bill in the Lok...

South Korea: Chief of Defence Counterintelligence Command arrested in martial law probe

Seoul, Dec 14: Prosecutors arrested Lt. Gen. Yeo In-hyung, South Korea's Chief of the Defence Counterintelligence Command, on...