Getting past passwords
Document Type
Journal Article
Publisher
Elsevier
Faculty
Faculty of Health, Engineering and Science
School
ECU Security Research Institute
RAS ID
15989
Abstract
Having been a core feature of IT systems for several decades, passwords continue to represent both one of the most familiar and most maligned aspects of security technology. While their potential weaknesses have been well recognised (but largely unchanged) over many years, there has equally been little sign of other approaches emerging to supplant them in terms of all-round usage and applicability. In spite of long-standing and well-recognised weaknesses, passwords continue to represent the most commonly encountered form of user authentication. However, there are now signs of viable alternatives. New approaches range from the more involved login processes demanded by services such as online banking, and the more user-friendly graphical approaches offered on mobile devices. Steven Furnell of Plymouth University finds that, while none of them represents a panacea, they do collectively serve to reduce the overall dependency upon passwords and ensure that users are exposed to a wider range of options.
DOI
10.1016/S1361-3723(13)70037-X
Comments
Furnell, S. (2013). Getting past passwords. Computer Fraud & Security, (4), 8-13. Available here