2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) 2017
DOI: 10.1109/cscloud.2017.20
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Email Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…This attitude by public leads to a tension between data privacy and the reality of cultural sharing. One of the main recommendations that we can learn from our study is that organizations, such as banks (Kaur et al 2020;Murdoch and Anderson 2010), email service providers (Li, Mehta, and Yang 2017;Al Maqbali and Mitchell 2018), wireless carriers (Lee et al 2020), that still consider DOB sensitive information should withdraw from using it as a part of their authentication system. Users should also not incorporate their birthdays into constructed passwords.…”
Section: Authentication Question Vs Celebrationmentioning
confidence: 98%
See 1 more Smart Citation
“…This attitude by public leads to a tension between data privacy and the reality of cultural sharing. One of the main recommendations that we can learn from our study is that organizations, such as banks (Kaur et al 2020;Murdoch and Anderson 2010), email service providers (Li, Mehta, and Yang 2017;Al Maqbali and Mitchell 2018), wireless carriers (Lee et al 2020), that still consider DOB sensitive information should withdraw from using it as a part of their authentication system. Users should also not incorporate their birthdays into constructed passwords.…”
Section: Authentication Question Vs Celebrationmentioning
confidence: 98%
“…Usage of DOB should especially be avoided since it is considered easily discoverable information (OPC 2016), especially with the spread of social media (Rabkin 2008;Irani et al 2011). Even with these warnings, some organizations such as banks (Kaur et al 2020;Murdoch and Anderson 2010;Smyth 2010), wireless carriers (Lee et al 2020), and email service providers (Li, Mehta, and Yang 2017;Al Maqbali and Mitchell 2018) still use DOB while authenticating users.…”
Section: Birth Dates In the Authentication Processmentioning
confidence: 99%