A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective

09/24/2017
by   Nicholas Micallef, et al.
0

Security questions are one of the mechanisms used to recover passwords. Strong answers to security questions (i.e. high entropy) are hard for attackers to guess or obtain using social engineering techniques (e.g. monitoring of social networking profiles), but at the same time are difficult to remember. Instead, weak answers to security questions (i.e. low entropy) are easy to remember, which makes them more vulnerable to cyber-attacks. Convenience leads users to use the same answers to security questions on multiple accounts, which exposes these accounts to numerous cyber-threats. Hence, current security questions implementations rarely achieve the required security and memorability requirements. This research study is the first step in the development of a model which investigates the determinants that influence users' behavioural intentions through motivation to select strong and memorable answers to security questions. This research also provides design recommendations for novel security questions mechanisms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/24/2017

A Serious Game Design: Nudging Users' Memorability of Security Questions

Security questions are one of the techniques used to recover passwords. ...
research
10/11/2017

Involving Users in the Design of a Serious Game for Security Questions Education

When using security questions most users still trade-off security for th...
research
01/31/2019

An Extensive Formal Security Analysis of the OpenID Financial-grade API

Forced by regulations and industry demand, banks worldwide are working t...
research
08/24/2019

That's Not Me! Designing Fictitious Profiles to Answer Security Questions

Although security questions are still widely adopted, they still have se...
research
09/07/2022

State of Security Awareness in the AM Industry: 2020 Survey

Security of Additive Manufacturing (AM) gets increased attention due to ...
research
01/16/2020

Social Engineering Resistant 2FA

Attackers increasingly, and with high success rates, use social engineer...
research
12/31/2019

Patterns and Interactions in Network Security

Networks play a central role in cyber-security: networks deliver securit...

Please sign up or login with your details

Forgot password? Click here to reset