Deep Thought: a Cybersecurity Story

Total Page:16

File Type:pdf, Size:1020Kb

Deep Thought: a Cybersecurity Story DEEP THOUGHT /////////// A cybersecurity story /////////// Alex Blau, Alexandra Alhadeff, Michael Stern, Scott Stinson, Josh Wright ideas42.org ⁄cyber // about ideas42 IDEAS42 USES INSIGHTS FROM BEHAVIORAL SCIENCE to help solve difficult social problems and make an impact at scale. We grew out of research programs in psychology and economics at top academic institutions and our work draws on decades of experimental scientific research in decision making, along with the most rigorous methods in program and policy evaluation. We work in a number of areas, including consumer finance, economic mobility and opportunity, health, education, energy efficiency, and international development. The conse- quences of the behavioral issues we tackle are often profound. A failure to adhere to medication can be life-threatening. Dropping out of school can prevent a person from achieving her potential. All too often, the reasons for these failures turn out to be small and remediable—but also usually overlooked or dismissed as unimport- ant. Our approach involves carefully diagnosing the behavioral issues that prevent otherwise well-designed programs and products from achieving their goals. We identify subtle but important contextual details that can influence behavior, and design innovative solutions that help to overcome or amplify their effects. Our work involves a lot of observation, plenty of patience, and a willingness to be surprised. Most of all, though, it involves asking the right questions. // acknowledgments THIS PROJECT WOULD NOT HAVE BEEN POSSIBLE without the sup- port of many individuals and institutions. ideas42 would like to thank the William and Flora Hewlett Foundation, whose generous support enabled us to examine crit- ical challenges in cybersecurity through the lens of behavioral science. We would like to give particular thanks to our Program Officer, Eli Sugarman, who lent us his sagely advice and guidance throughout the project and helped us get up to speed quickly on this incredibly diverse topic area by connecting us with the right people and content. Additionally, many thanks to the Hewlett Foundation President, Larry Kramer, for having the foresight to push forward cybersecurity as a major founda- tion initiative so that it gets the attention it deserves as a critical issue for our coun- try and humankind. We would also like to thank our colleagues at the New America Foundation including Ian Wallace, co-director of the cybersecurity program, and Robert Morgus, policy analyst, who provided us with their expertise throughout the project and connected us with many exceptional people. We would like to give special thanks to Ian in particular, who first suggested that we use the behavior- al perspective to take a look at cybersecurity challenges—without that nudge, we may not have endeavored down this path in the first place. Many thanks to those who supported our writing effort including the narrative wisdom of Peter Singer and Peter Kelly as well as Jason Hong, Nicole Becher, and Greg Michaelidis who provided feedback on our early draft. We are also indebted to the 60 experts from academia, government, policy, consulting, and industry who graciously contributed their time and invaluable insights to this project, and whose experiences informed the narrative we’ve crafted. There are many more people who helped to contribute to this work whom we may not have named here and we thank them as well for all their support. Finally, we’d like to acknowledge the coders, end users, IT adminis- trators, policy makers, and executives working at the forefront of cybersecurity who inspired this work. Ideas42 © 2017 | ideas42.org 80 Broad Street, 30th Floor New York, NY 10004 This work is licensed under a Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License. // Contents CHAPTER 1: THE HACK ........................................................................... 1 BOX: Open Wifi and Channel Factors .......................................................................................3 CHAPTER 2: PEOPLE, NOT COMPUTERS ....................................9 BOX: A Brief History of Behavioral Economics ............................................................14 CHAPTER 3: TAKE ME OUT TO THE BALL GAME ...................17 BOX: The Affect Heuristic and Bad Links ...........................................................................19 BOX: Warnings, Habituation, and Generalizability ...................................................22 BOX: The Choice Architecture of Updates ......................................................................24 BOX: Thinking Fast and The Internet ......................................................................................26 CHAPTER 4: D33PTH0UGH1 ............................................................ 31 BOX: Incomplete Rules of Thumb ..............................................................................................33 BOX: Status Quo Bias and Passwords ..................................................................................36 BOX: The Hassle with Multifactor Authentication ....................................................38 BOX: Availability and the Risks We See ..............................................................................40 CHAPTER 5: OPEN ACCESS ..............................................................41 BOX: Vulnerability Sharing and Present Bias................................................................44 BOX: Access Controls and The Context of Scarcity ............................................47 BOX: Congruence Bias and Investment ...............................................................................51 CHAPTER 6: GONE PHISHING ........................................................ 55 BOX: Phishing from Authority ............................................................................................................59 BOX: Primed to See What They Want You to See ................................................. 61 BOX: Insecurity by Default .....................................................................................................................63 CHAPTER 7: THE WAGER .................................................................. 67 BOX: Mental Models and Thinking About Security...............................................72 CHAPTER 8: THE LONG WAY HOME ............................................75 APPENDIX Updating ........................................................................................................................................................................84 Security Warnings ...........................................................................................................................................87 Safe Coding .............................................................................................................................................................90 Passwords ..................................................................................................................................................................95 Multifactor Authentication Use .....................................................................................................100 Employee Commitment to Cybersecurity .....................................................................103 Access Control Management ........................................................................................................106 Threat and Vulnerability Sharing ...............................................................................................110 End User Security Settings..................................................................................................................114 Phishing ........................................................................................................................................................................119 Investing in Cybersecurity ...................................................................................................................123 DEEP THOUGHT //////// A cybersecurity story //////// Chapter 1 THE HACK THE RUMBLE OF THE APPROACHING N TRAIN echoed through the subway tunnels. Commuters, standing at the platform’s edge, began leaning out to glimpse the train’s light peeking out from around the bend. Others stood idly playing with their phones, reading books, or thumbing through papers in advance of the workday. But one woman, her face illuminated in cobalt, sat on a bench, hunched over her laptop screen. The train arrived on the platform like a riot. The doors opened, and a mass of bodies exchanged places. Those who got off clamored towards the stairs leading up to the street, while those onboard pressed themselves into some uninhabited nook of humanity and held on. The doors of the train closed following a loud “ding,” and the train lurched back into motion, continuing its journey beneath the city. However, the woman on the bench did not move. A dozen trains had come and gone while she sat there, but she paid as much attention to the bustle as a beach- goer would to the waves and rising tide. Instead, she continued to clack away on her keyboard, engrossed in her work, ignorant to the goings-on around her. As the train moved out of earshot, the woman stopped to scrutinize the con- tents of the screen in front of her. Two hundred and eighty-seven words, honed like a knife, filled the page of her word processor. She silently mouthed the words
Recommended publications
  • A Comparative Analysis of Anti-Phishing Mechanisms: Email Phishing
    Volume 8, No. 3, March – April 2017 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info A Comparative Analysis of Anti-Phishing Mechanisms: Email Phishing ShwetaSankhwar and Dhirendra Pandey BabasahebBhimraoAmbedkar University Lucknow, U. P., India Abstract: Phishing has created a serious threat towards internet security. Phish e-mails are used chiefly to deceive confidential information of individual and organizations. Phishing e-mails entice naïve users and organizations to reveal confidential information such as, personal details, passwords, account numbers, credit card pins, etc. Phisher spread spoofed e-mails as coming from legitimate sources, phishers gain access to such sensitive information that eventually results in identity and financial losses.In this research paper,aexhaustive study is done on anti-phishing mechanism from year 2002 to 2014. A comparative analysis report of anti-phishing detection, prevention and protection mechanisms from last decade is listed. This comparativeanalysis reports the anti-phishing mechanism run on server side or client side and which vulnerable area is coverd by it. The vulnerable area is divided into three categories on the basis of email structure. The number of vulnerabilties covered by existing anti-phishing mechanisms are listed to identify the focus or unfocused vulnerability. This research paper could be said as tutorial of a existing anti-phishing research work from decade. The current work examines the effectiveness of the tools and techniques against email phishing. It aims to determine pitfalls and vulnerability of anti-phishing tools and techniques against email phishing. This work could improve the understanding of the security loopholes, the current solution space, and increase the accuracy or performance to counterfeit the phishing attack.
    [Show full text]
  • How to Layer and Sell Security Solutions to Protect Your Clients’ Remote Workers, Data, and Devices
    How to Layer and Sell Security Solutions to Protect Your Clients’ Remote Workers, Data, and Devices PAX8 | PAX8.COM ©2021 Pax8 Inc. All rights reserved. Last updated April 2021. About This Guide This guide offers recommendations to build a layered remote security stack and position it to your clients to keep them productive and secure while working remotely. Introduction Shifting the Security Focus: From the Perimeter to Endpoints 2 Building the Foundation for Remote Security 1. Put Endpoint Security in Place 3 2. Layer on Additional Email Security 4 3. Begin Ongoing End User Security Training 5 Standardizing Your Remote Security Stack: Trending Solutions 6 Fortifying Remote Defenses Other Tools to Secure Remote Work Environments 7 Advancing the Conversation Remote Security Checklist 8 Email Template for Layered Security 9 Education, Enablement & Professional Services Your Expert for Secure Remote Work 10 [email protected] | +1 (855) 884-7298 | pax8.com INTRODUCTION A Shift in Security Focus: While the global spike in remote work in 2020 helped many companies stay productive, it also increased security challenges as employees remotely accessed company networks, of remote workers say files, and data. With more employees working outside their biggest challenge of the safety of perimeter security related to the is collaboration and corporate network and firewalls, IT security focus communication1 shifted to endpoints, email, and end users as the first line of defense. A Wave of COVID-19 Related Cyber Risks: The surge in remote work due to COVID-19 (and the resulting security vulnerabilities) fueled an alarming rise in cybercrime – the FBI reported in August 2020 that cyberattack complaints were up by 400%!2 Microsoft reported that pandemic-themed phishing and social engineering attacks jumped by 10,000 a day, while cybersecurity experts reported that ransomware attacks were up by 800%.
    [Show full text]
  • Keepass Password Safe Help
    KeePass Password Safe KeePass: Copyright © 2003-2011 Dominik Reichl. The program is OSI Certified Open Source Software. OSI Certified is a certification mark of the Open Source Initiative. For more information see the License page. Introduction Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. He would have access to your e-mail account, website, etc. Unimaginable. But who can remember all those passwords? Nobody, but KeePass can. KeePass is a free, open source, light-weight and easy-to-use password manager for Windows. The program stores your passwords in a highly encrypted database. This database consists of only one file, so it can be easily transferred from one computer to another. KeePass supports password groups, you can sort your passwords (for example into Windows, Internet, My Website, etc.). You can drag&drop passwords into other windows. The powerful auto-type feature will type user names and passwords for you into other windows. The program can export the database to various formats. It can also import data from various other formats (more than 20 different formats of other password managers, a generic CSV importer, ...). Of course, you can also print the password list or current view. Using the context menu of the password list you can quickly copy password or user name to the Windows clipboard.
    [Show full text]
  • CHUENCHUJIT-THESIS-2016.Pdf
    c 2016 Thasphon Chuenchujit A TAXONOMY OF PHISHING RESEARCH BY THASPHON CHUENCHUJIT THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2016 Urbana, Illinois Adviser: Associate Professor Michael Bailey ABSTRACT Phishing is a widespread threat that has attracted a lot of attention from the security community. A significant amount of research has focused on designing automated mitigation techniques. However, these techniques have largely only proven successful at catching previously witnessed phishing cam- paigns. Characteristics of phishing emails and web pages were thoroughly analyzed, but not enough emphasis was put on exploring alternate attack vectors. Novel education approaches were shown to be effective at teach- ing users to recognize phishing attacks and are adaptable to other kinds of threats. In this thesis, we explore a large amount of existing literature on phishing and present a comprehensive taxonomy of the current state of phish- ing research. With our extensive literature review, we will illuminate both areas of phishing research we believe will prove fruitful and areas that seem to be oversaturated. ii In memory of Nunta Hotrakitya. iii ACKNOWLEDGMENTS I would like to express my deepest gratitute to Professor Michael Bailey for guiding this work from start to finish. I also greatly appreciate the essential assistance given by Joshua Mason and Zane Ma. Finally, I wish to thank my parents for their love and support throughout my life. iv TABLE OF CONTENTS CHAPTER 1 INTRODUCTION . 1 CHAPTER 2 RELATED WORK . 3 CHAPTER 3 ATTACK CHARACTERISTICS .
    [Show full text]
  • Utilising the Concept of Human-As-A-Security-Sensor for Detecting Semantic Social Engineering Attacks
    Utilising the concept of Human-as-a-Security-Sensor for detecting semantic social engineering attacks Ryan John Heartfield A thesis submitted in partial fulfilment of the requirements of the University of Greenwich for the Degree of Doctor of Philosophy DOCTOR OF PHILOSOPHY June 2017 Declaration \I certify that the work contained in this thesis, or any part of it, has not been accepted in substance for any previous degree awarded to me, and is not concurrently being submitted for any degree other than that of Doctor of Philosophy being studied at the University of Greenwich. I also declare that this work is the result of my own investigations, except where otherwise identified by references and that the contents are not the outcome of any form of research misconduct." SUPERVISOR: ................................................ ............................... RYAN HEARTFIELD SUPERVISOR: ................................................ ............................... DR. GEORGE LOUKAS SUPERVISOR: ................................................ ............................... DR. DIANE GAN i Abstract Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strate- gies to psychologically manipulate a user. Semantic attacks are the spe- cific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Semantic social engineering
    [Show full text]
  • Technical Guides
    Technical Guides KeePass Password Manager Tutorial Wireguard Ubuntu Deployment SQM for 1 Gbps Lines With OpenWrt KeePass Password Manager Tutorial Introduction I don't trust online password managers because they are closed source and companies have been hacked in the past. If you look up "lastpass breached" in Google you can see my point. Keepass is open source and offline. Why put your trust in a company when you can create and access the database yourself? An honorable mention is bitwarden. They are also open-source and you have the option of hosting your own bitwarden server at home as an option. If you want to pay and are willing to trust a company and have your passwords encrypted on their cloud they would be your best bet. Downloading Keepass https://keepass.info/download.html Get the Installer for Windows (2.45) aka KeePass-2.45-Setup.exe. After you get it install Keepass. Recommended plugins (.plgx) to download: Keepass has a variety of useful plugins listed here: https://keepass.info/plugins.html I recommend the following below for now. Plugins always have a .plgx file extension. WebAutoType-v6.3.0.zip: https://sourceforge.net/projects/webautotype/files/ YetAnotherFaviconDownloader.plgx: https://github.com/navossoc/KeePass-Yet-Another- Favicon-Downloader/releases After you downloaded the necessary .plgx plugins. Copy or move them into the Plugins folder at C:\Program Files (x86)\KeePass Password Safe 2\Plugins. 1.1.1 Master Password To start off you will be creating a master password which is the masterkey to access all your other passwords.
    [Show full text]
  • Enpass User Manual - Android Version 6.7
    Enpass User Manual - Android version 6.7 Enpass Technologies Inc. August 19, 2021 Contents User Manual 1 Introduction to Enpass 1 Prerequisites 1 Getting Started 1 As a new user 4 As an existing user 6 Import Passwords from Other Sources 6 Master password 6 Keyfiles 6 Generating the keyfile 7 Adding the keyfile 7 Removing keyfiles 7 Registration 7 Adding and Managing items 9 Adding Item 9 Adding One-Time Code 10 Adding Attachments 12 Attach Photo 12 Attach file 12 View Attachment 12 Delete Attachment 12 Tags 13 Tagging items 13 From Edit page 13 From Sidebar 13 Nested Tags 14 Editing Tags 14 Untag an Item 14 Deleting and Archiving 14 Trash 14 Archive 15 Duplicating Item 15 Customizing Fields 15 Editing field type 15 Adding fields 16 Re-ordering Fields 16 Deleting fields 17 Field History 17 Customizing Password Fields 18 Exclude from Audit 18 Set Password Expiry 18 Sensitive 18 Adding Section 18 Customizing icons 18 Using website icons 18 Enabling website icons for a particular site: 19 Using your own images as custom icons 19 Changing Category 20 Search 20 Sort By 21 Title 21 Url 21 Created Date 22 Modified Time 22 Recently Used 23 Frequently Used 23 Moving Items to Other Vaults 23 Checking Compromised Passwords 23 Checking Individual Password 23 Checking All Passwords 24 How does it work? 25 What to do if you have Compromised Passwords? 25 Change Password Immediately 25 Enable Two-Factor Authentication 25 Regularly keep a check on Passwords’ Health 25 Using Password Generator 25 Generating Passwords 25 Pronounceable Passwords 25 Random
    [Show full text]
  • HACK Enpass Password Manager
    1 / 2 HACK Enpass Password Manager Mar 23, 2021 — So, is this password manager right for you or your business? In our Enpass review, we'll take a closer look at everything this software has to offer.. Results 1 - 100 of 338 — TOTP is an algorithm that computes a one-time password from a shared secret ... codes to protect your online accounts from hackers (bad guys). ... code in my password manager, especially for password managers that can ... Segregate data using Multiple vaults Enpass facilitates you with an option to .... Jan 9, 2019 — Password manager company OneLogin was actually hacked, and the ... EnPass: Here's something unusual—a password manager that goes .... Use Enpass audit tools to identify weak, identical, and old passwords. Your password manager is your digital security best friend. You are using a password .... The Synology Disk Station Manager (DSM) is the Operating System (OS) that runs on your Synology unit. ... a prerequisite while using Enpass it is not really neccessary to me to sync with CloudStation. ... For iOS 13/12 users: Open the Settings app > Passwords & Accounts > Add Account > Other ... Mikrotik hack github.. We will send a One-time password (OTP) to your registered email address and ... set of Enpass users by letting them store their time based one time passwords of ... Hackers use credit card skimmers to obtain the magnetic stripe information of a ... Open Google Chrome and click the GateKeeper Password Manager Chrome .... Jun 16, 2021 — Using an online password manager? … Are they safe from hackers?? Use Enpass to securely organize everything at one place.
    [Show full text]
  • The Usable Security of Passwords Based on Digital Objects: from Design and Analysis to User Study∗
    The Usable Security of Passwords based on Digital Objects: From Design and Analysis to User Study∗ Mohammad Mannan Tara Whalen, Robert Biddle Electrical and Computer Engineering Dept. P.C. van Oorschot University of Toronto School of Computer Science Toronto, Canada Carleton University [email protected] Ottawa, Canada Abstract Despite all efforts, password schemes intended to deploy or encourage the use of strong passwords have largely failed. As an interesting alternative to enable users to create, maintain and use high quality passwords willingly, we propose Object-based Password (ObPwd), leveragingthe universe of personal or personally meaningful digital content that many users now own or have access to. ObPwd converts user- selected digital objects to high-entropy text passwords. Memorization of exact passwords is replaced by remembering password objects. We present the design details, variants, and usability and security analysis of ObPwd; briefly discuss (publicly available) prototype implementations in various forms on several platforms; and as a major focus, report on the results of a hybrid in-lab/at-home user study on 32 participants. The results suggest the scheme has good usability, with excellent memorability, acceptable login times, and very positive user perception, achieved while providing strong security for the threat context explored. While we anticipate further experience with ObPwd will lead to improved security and usability, and best practice guidelines, we believe this work lays the foundations for a promising password selection paradigm. 1 Introduction and Motivation Text passwords remain ubiquitous, despite endless criticism. Independent studies conducted decades apart reveal that people consistently choose ‘weak’ passwords [19, 6] for many reasons, including users trying to manage on average 25 password-protected accounts [7].
    [Show full text]
  • Open Research Online Oro.Open.Ac.Uk
    Open Research Online The Open University’s repository of research publications and other research outputs Forensically-Sound Analysis of Security Risks of using Local Password Managers Conference or Workshop Item How to cite: Gray, Joshua; Franqueira, Virginia N. L. and Yu, Yijun (2016). Forensically-Sound Analysis of Security Risks of using Local Password Managers. In: Proceedings: 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), IEEE, pp. 114–121. For guidance on citations see FAQs. c 2016 IEEE https://creativecommons.org/licenses/by-nc-nd/4.0/ Version: Accepted Manuscript Link(s) to article on publisher’s website: http://dx.doi.org/doi:10.1109/REW.2016.034 Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online’s data policy on reuse of materials please consult the policies page. oro.open.ac.uk Forensically-Sound Analysis of Security Risks of using Local Password Managers Joshua Gray∗, Virginia N. L. Franqueira∗ and Yijun Yuy ∗ College of Engineering and Technology, University of Derby, UK y School of Computing and Communications, The Open University, UK Abstract—Password managers address the usability challenge has a domino side-effect on security [5]; they write them down of authentication, i.e., to manage the effort in creating, memoris- or recycle old passwords with small changes [4]; or they use ing, and entering complex passwords for an end-user. Offering highly guessable passwords [6]. All these strategies undermine features such as creating strong passwords, managing increasing number of complex passwords, and auto-filling of passwords security in favour of usability.
    [Show full text]
  • Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc
    Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc. “ Syngress: The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. Unique Passcode 28475016 PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Mobile Malware Attacks and Defense Copyright © 2009 by Elsevier, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.
    [Show full text]
  • Revisiting Security Vulnerabilities in Commercial Password Managers?
    Revisiting Security Vulnerabilities in Commercial Password Managers? Michael Carr1 and Siamak F. Shahandashti2 1 Piksel, York Science Park, YO10 5ZD, UK [email protected] 2 Dept. of Computer Science, University of York, YO10 5GH, UK [email protected] Abstract. In this work we analyse five popular commercial password managers for security vulnerabilities. Our analysis is twofold. First, we compile a list of previously disclosed vulnerabilities through a compre- hensive review of the academic and non-academic sources and test each password manager against all the previously disclosed vulnerabilities. We find a mixed picture of fixed and persisting vulnerabilities. Then we carry out systematic functionality tests on the considered password managers and find four new vulnerabilities. Notably, one of the new vulnerabilities we identified allows a malicious app to impersonate a legitimate app to two out of five widely-used password managers we tested and as a result steal the user's password for the targeted service. We implement a proof- of-concept attack to show the feasibility of this vulnerability in a real-life scenario. Finally, we report and reflect on our experience of responsible disclosure of the newly discovered vulnerabilities to the corresponding password manager vendors. Keywords: Vulnerability Testing · Password Managers · Password Man- ager Security · Authentication. 1 Introduction Passwords remain the dominant authentication mechanism in the digital realm despite their shortcomings. Furthermore, they are expected to persist as a pri- mary authentication mechanism for the some time [6]. Among the tools that can greatly reduce the cognitive burden of remembering multiple passwords for arXiv:2003.01985v2 [cs.CR] 17 Mar 2020 multiple services are password managers.
    [Show full text]