Skip to main content

Beyond Passwords: Enforcing Username Security as the First Line of Defense

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 960))

Included in the following conference series:

Abstract

Combinations of account identifier (e.g., username) and key phrase (i.e., password) are among the most utilized form of credentials for several types of authentication purposes, such as, user verification, connection to public and private networks, and access to digital resources. Typically, usernames are considered a method of account or user identification, whereas passwords are regarded as the crucial component that protects from attackers and prevents breaches. As a result, the level of security of a set of digital credentials is primarily associated with the strength of the key phase, and most of the attention focused on promoting initiatives for increasing password security. Unfortunately, account identifiers received less consideration. Consequently, users are aware of how to enforce the security of their password, though they might prefer more convenient options. Contrarily, several bad practices are caused by overlooking usernames as the first line of defense. In this paper, we highlight the increasing importance of account names and we overview the main username practices that impact account security. Furthermore, we present the results of a study that evaluated how human factors and individuals’ awareness impact username security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Caporusso, N., Chea, S., Abukhaled, R.: A game-theoretical model of ransomware. In: International Conference on Applied Human Factors and Ergonomics, pp. 69–78. Springer, Cham, July 2018. https://doi.org/10.1007/978-3-319-94782-2_7

    Google Scholar 

  2. Dev, J.A.: Usage of botnets for high speed MD5 hash cracking. In: Third International Conference on Innovative Computing Technology (INTECH 2013), pp. 314–320. IEEE, August 2013

    Google Scholar 

  3. Brumen, B., Taneski, V.: Moore’s curse on textual passwords. In: 2015 28th International Convention on Information and Communication Technology, Electronics and Micro-electronics (MIPRO) (2015). https://doi.org/10.1109/MIPRO.2015.7160486

  4. National Institute of Standards and Technology Special Publication 800-63B., p. 78, June 2017. https://doi.org/10.6028/NIST.SP.800-63b

  5. Onaolapo, J., Mariconti, E., Stringhini, G.: What happens after you are pwnd: understanding the use of leaked webmail credentials in the wild. In: Proceedings of the 2016 Internet Measurement Conference, pp. 65–79. ACM, November 2016

    Google Scholar 

  6. Lenig, S., Caporusso, N.: Minecrafting virtual education. In: International Conference on Applied Human Factors and Ergonomics, pp. 275–282. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94619-1_27

    Google Scholar 

  7. Hunt, T.: Password reuse, credential stuffing and another billion records in have i been pwned, May 2017. https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned/. Accessed 31 Jan 2018

  8. Stainbrook, M., Caporusso, N.: Convenience or strength? Aiding optimal strategies in password generation. In: International Conference on Applied Human Factors and Ergonomics, pp. 23–32. Springer, Cham, July 2018. https://doi.org/10.1007/978-3-319-94782-2_3

    Google Scholar 

  9. Basta, A.: Computer Security and Penetration Testing, 2nd edn. Cengage Learning. VitalBook file (2015). Accessed 8 Aug 2013

    Google Scholar 

  10. Shi, Y.: A method of discriminating user’s identity similarity based on username feature greedy matching. Paper Presented at the 2018 2nd International Conference on Cryptography, Security, and Privacy, March 2018. https://doi.org/10.1145/3199478.3199512

  11. Wang, L., Li, Y., Sun, K.: Amnesia: a bilateral generative password manager. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 313–322 (2016)

    Google Scholar 

  12. Jenkins, J.L., Grimes, M., Proudfoot, J., Lowry, P.B.: Improving password cybersecurity through inexpensive and minimally invasive means: detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings. Inf. Technol. Dev. 20(2), 196–213 (2013)

    Article  Google Scholar 

  13. Perito, D., Castelluccia, C., Kaafar, M.A., Manils, P.: How unique and traceable are usernames? In: Privacy Enhancing Technologies. Lecture Notes in Computer Science, pp. 1–17 (2011). https://doi.org/10.1007/978-3-642-22263-4_1

    Google Scholar 

  14. Xiao, X., Caporusso, N.: Comparative evaluation of cyber migration factors in the current social media landscape. In: 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 102–107. IEEE, August 2018. https://doi.org/10.1109/W-FiCloud.2018.00022

  15. Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Bursztein, E.: Data breaches, phishing, or malware? Understanding the risks of stolen credentials. Paper Presented at the 2017 ACM SIGSAC Conference on Computer and Communications Security, October 2017. https://doi.org/10.1145/3133956.3134067

  16. Caporusso, N., Stainbrook, M.: Comparative evaluation of security and convenience trade-offs in password generation aiding systems. In: International Conference on Applied Human Factors and Ergonomics. Springer, July 2019. (to be published)

    Google Scholar 

  17. Johansson, J.M., Brezinski, D.I., Hamer, K.L.: U.S. Patent No. US13277423, U.S. Patent and Trademark Office, Washington, D.C. (2011)

    Google Scholar 

  18. Tam, L., Glassman, M., Vandenwauver, M.: The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol. 29(3), 233–244 (2010). https://doi.org/10.1080/01449290903121386

    Article  Google Scholar 

  19. Bošnjak, L., Brumen, B.: Improving the evaluation of shoulder surfing attacks. In: Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics (2018). https://doi.org/10.1145/3227609.3227687

  20. Bevilacqua, V.: Retinal fundus biometric analysis for personal identifications. In: International Conference on Intelligent Computing, pp. 1229–1237. Springer, Heidelberg, September 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicholas Caporusso .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fandakly, T., Caporusso, N. (2020). Beyond Passwords: Enforcing Username Security as the First Line of Defense. In: Ahram, T., Karwowski, W. (eds) Advances in Human Factors in Cybersecurity. AHFE 2019. Advances in Intelligent Systems and Computing, vol 960. Springer, Cham. https://doi.org/10.1007/978-3-030-20488-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20488-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20487-7

  • Online ISBN: 978-3-030-20488-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics