Preview

Password Pattern Analysis

Powerful Essays
Open Document
Open Document
1509 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Password Pattern Analysis
RESEARCH PROPOSAL
Password pattern analysis, measuring password strength from CSDN leaked passwords

Inducement of this problem:
"On 21st, Dec, 2011, Account information for more than 6 millions registered users of online community Chinese Software Developer Network (CSDN.net) has reportedly been leaked online. Industry sources today added that account information has also been leaked for 8 millions and 20 millions users, respectively, of the 7k7k and 178.com gaming websites. CSDN has confirmed the news, saying the leaked information is from a 2009 backup of the site 's database, although the exact cause for the leak has yet to be determined. Online sources say that the leaks were deliberate and users of Chinese SNS sites Renren and Kaixin001, the Tianya online community and matchmaking sites Jiayuan.com and Baihe.com will be the next targets (these website are just involved in rumors now, no password package from them are leaked) "[1]. (on 25th, Dec, 2011, the data from Tianya online community having already being leaked and I have downloaded the package also ensure that username-password are effective most --from author)

Backgrounds:
Text-based passwords is still and will remain the most significant authentication method in an expected long time for computer systems, especially the social network systems (SNS) are keeping their usernames and passwords in the database. The most recent example of data breaches involving large numbers of hashed passwords happened in China is the CSDN Password-Scandal, which involves more then 6 millions users ' passwords being leaked. This threat is so real that once these passwords have been cracked, they can be used to gain access not only to the original site, but also to other accounts where users have reused their passwords. This is an important consideration because studies indicate that password reuse (exactly and with minor variations) is a common and growing practice as users acquire more online accounts.



References: [1] Marbridge Consulting. Rumor: Online Community CSDN.net Suffers Data Breach, Techweb. http://www.marbridgeconsulting.com/marbridgedaily/2011-12-22/article/52430/rumor_online_co mmunity_csdnnet_suffers_data_breach December, 2011 [2] GAW, S., ANDFELTEN, E. W. Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (New York, NY, USA, 2006), SOUPS ’06, ACM, pp. 44–55. [3] SHAY, R., KOMANDURI, S., KELLEY, P., LEON, P., MAZUREK, M., BAUER, L., CHRISTIN, N., ANDCRA-NOR, L. Encountering stronger password requirements: user attitudes and behaviors. In Proc. SOUPS’10(2010). [4] KUO, C., ROMANOSKY, S., ANDCRANOR, L. F. Human selection of mnemonic phrase-based passwords. In Symposium on Usable Privacy and Security(2006), pp. 67–78. [5] PROCTOR, R. W., LIEN, M.-C., VU, K.-P. L., SCHULTZ, E. E., ANDSALVENDY, G. Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Res. Methods, Instruments, & Computers 34, 2 (2002), 163–169. [6] VU, K.-P. L., PROCTOR, R. W., BHARGAV-SPANTZEL, A., TAI, B.-L. B., ANDCOOK, J. Improving password security and memorability to protect personal and organizational information. Int. J. of Human-Comp. Studies 65, 8 (2007), 744–757. [7] SHANNON, C. E. A mathematical theory of communication. Bell Syst. Tech. J. 27(1949), 379–423,623–656. [8] SHANNON, C. E. A mathematical theory of communication. Bell Syst. Tech. J. 27(1949), 379–423,623–656.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When planning password policy’s stress extra protection, in some cases, a good password is enough protection to keep out intruders. In others, it’s just a start. Encryption and one-time passwords add extra protection to systems. Encryption means garbling the password to protect from sniffers or other onlookers, through a particular scheme that can be deciphered from the other end of the connection. Users should exercise extreme caution when writing down or storing passwords. Stories of hackers obtaining passwords through shoulder-surfing and dumpster diving are not urban myths, they are real. Here a good practice for a company to…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A wide array of interactions among plants, animals, and microorganisms occurs in nature. Some of these relationships are characterized by a close physical association among species that continues for a large period of the life cycle. In 1879 German botanist Heinrich Anton de Bary coined the term "symbiosis" to describe these relationships, meaning the living together of different species of organisms. Many people associate symbiosis with mutualism, interactions that are beneficial to the growth, survival, and/or reproduction of both interacting species. But symbiotic interactions also include commensalism (one species receives benefit from the association and the other is unaffected), amensalism (one species is harmed, with no effect on the other), and parasitism. An example of commensalism is found in the anemone fish, which gains protection from living among the poisonous tentacles of the sea anemone, but offers no known benefit to its host.…

    • 1005 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Within the World Wide Web, social network is becoming the favorite target for cybercriminals. This…

    • 526 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the article, “The psychology of password management: a tradeoff between security and convenience”, the author…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Dystopian Novel

    • 1604 Words
    • 7 Pages

    ProQuest Staff. “At Issue: National Security and Privacy.” ProQuest LLC. SIRS Issues Researcher, 2011. Web. 5 Dec. 2011. .…

    • 1604 Words
    • 7 Pages
    Powerful Essays