Where Do Security Policies Come From?
Date: July 14 2010 Publication: Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS '10) Publisher: USENIX Source 1: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/WhereDoSecurityPoliciesComeFrom.pdf Source 2: https://cups.cs.cmu.edu/soups/2010/proceedings/a10_florencio.pdf Abstract or Summary:
We examine the password policies of 75 different web-sites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while others impose rules of great complexity on their users. We compare different features of the sites to find which characteristics are correlated with stronger policies. Our results are surprising: greater security demands do not appear to be a factor. The size of the site, the number of users, the value of the assets protected and the frequency of attacks show no correlation with strength. In fact we find the reverse: some of the largest, most attacked sites with greatest assets allow relatively weak passwords. Instead, we find that those sites that accept advertising, purchase sponsored links and where the user has a choice show strong inverse correlation with strength. We conclude that the sites with the most restrictive password policies do not have greater security concerns, they are simply better insulated from the consequences of poor usability. Online retailers and sites that sell advertising must compete vigorously for users and traffic. In contrast to government and university sites, poor usability is a luxury they cannot afford. This in turn suggests that much of the extra strength demanded by the more restrictive policies is superfluous: it causes considerable inconvenience for negligible security improvement. Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.
<-- Back to Authentication Research Paper Index |