Skip to main content

Questionnaire for initial research

 Questions, which I am planning to include in questionnaire, are provided in this blog post.

Questions:

       Demographic part:

  1. What is your gender? (A: Male; B: Female; C: Prefer not to say)
  2. What is your age? (A: under 18; B: 18-30; C: over 30)
  3. What course are you going to study at DMU?
  4. What part of the world you have come from? (A: Europe; B: Asia; C: Africa; D: Middle east; E: Other)
        Main part:
  1. Do you often use same passwords on different services? (A: I have 1 passwords for all services; B: Sometimes I use same passwords in multiple services; C: I try to avoid same passwords, but sometimes I use them; D: I have different passwords for all services) 
  2. What length do your passwords usually have? (A: 8 characters; B: Between 8 and 14 characters; C: More than 14 characters)
  3. How complicated your passwords usually are? (A: Capital letters, small letters, numbers and symbols combined; B: Capital letters, small letters and numbers; C: Capital and small letters; D: Only small letters)
  4. Do you use social networks? (A: Yes; B: No)
  5. Do you change your passwords (A: Never; B: only when necessary (i.e. when forgot); C: I do, but less than once a year; D: More than once a year; C: More than once a month)
  6. Have you ever had any of your accounts on the internet stolen (A: Yes; B: No)
  7. Have you ever used password managers (A: yes; B: no)
  8. Do you tend to use two/three step verifications? For instance connecting your email address to your mobile phone number (A: Often; B: Rarely; C: Try to avoid)
  9. If you answer "try to avoid" on the previous question, what is the reason for this? (A: Afraid of revealing personal information, such as mobile number; B: It takes longer time to log in with two/three step authentication; C: other; D: I did not answer previous question that way)
  10. If you try to avoid password managers, what is the reason for this?


Comments

Popular posts from this blog

Software review: Hashcat

In the following blogpost the way I used software called hashcat in my project is described. The example of using this software for dictionary attack is demonstrated. In my work I used information provided by Tavarez (2020) .   According to Porup (2020) hashcat is one of the most popular password crackers all around the world. Moreover, hashcat is included in the list of basic tools in Kali linux – linux distribution widely used by cybersecurity specialists. I installed Kali linux virtual machine in order to use this program and to show the example of a dictionary attack (Author's screenshot) However, before looking at the examples of using hashcat on practise, it is useful to understand in which areas hashcat is using. In plain words, hashcat is a password guesser which includes a number of features and pre-installed functionalities for cracking passwords by penetrating brute-force and dictionary attacks. The way it works is not too sophisticated, it hashes considerable numbe...

Major project theme

Every person has heard about how important it is to have a well-built strong password. An essential number of people would agree that password hygiene is as important as the personal hygiene is, since violation of first may lead to much more serious consequences. However, the statistics show that 59% of users use their names and dates of birth as their passwords, 43% shared their passwords with other people and only 45% would change a password after a breach (O’Driscoll, 2020). The aim of this post is to show how to create strong passwords. It is necessary to know how passwords are cracked in order to properly understand what password can be referred as strong one. There are to ways to execute an attack: online and offline.  Online attack is done by trying different passwords one by one through a normal log in process. Usually, such attacks are unsuccessful since they are easy to detect and block if necessary (Burnett and Kleiman, 2006).  I think everybody encountered situatio...