DPI16_Banner_300x250 WITH COPY

We have online accounts for everything these days: banking, e-mail, social networking, shopping, you name it. For every website that you sign up for, you have to create a username and a password that fits certain criteria. Some websites require that your password is between eight and 15 characters, but you can only use alphanumeric characters. Other sites require that you use at least one special character. Others won’t let you create an account unless your password contains a combination of capital and lowercase letters. With so many different rules, how can you possibly keep track of all of your passwords?

You could try to use the same password for each site, but that leaves you very vulnerable to hackers. You could create vastly different passwords, but then you might have to write them on a sheet of paper or create an Excel spreadsheet just to remember them. If someone got hold of that file, your security would be highly jeopardized.

The truth is there’s no easy way to remember your password to each individual site, considering that you probably don’t access some of them regularly. So what do you do when you forget your password and can’t login? That’s where the security question comes into the picture.

When you create an online account, most sites will ask you to choose a series of security questions—usually about three—to verify your identity. Therefore, when you click “forgot password,” the website operator can be sure it’s really you requesting the password and not a hacker who gained access to your e-mail account. The problem is that these security questions fail at their essential purpose.

Security questions frequently ask for “Facebook” information. That is, information that can be discovered very easily. Examples of common security questions include:

  • What year did you graduate high school?
  • What town did you grow up in?
  • What was the make of your first car?
  • What was the name of your first pet?

Anyone with whom the user interacts on a frequent basis would know the answer to most of these questions and could easily gain access to supposedly “secure” accounts. Furthermore, even if the person attempting to gain access has no relationship with the user, he or she can still easily guess most of these answers. The year someone graduates high school and the town where he or she grew up can be found either on social networking sites or even through certain public records. While the other questions; e.g., first car, might be harder to answer, a hacker could simply enter the name of common car manufacturers and likely gain access.

Security questions are extremely vulnerable to brute-force attacks. A brute-force attack is a method employed by a hacker by cycling through every possible combination of letters and numbers to predict a password. While this can be very difficult for password access—since many users also use special characters—many websites only allow letters and numbers to be used for the answer to security questions. Therefore, it’s actually easier to guess a user’s answer to a “security question” than the password itself.

So what are the solutions? There are three, in short.

Website Operators Need To Create More Personal Security Questions

As discussed above, the security questions currently used by websites ask for information known to the user’s friends, family etc., or, if not known, easily discovered. For example, if a hacker knows that an individual is about 25 years old, then he or she can easily guess which year the user graduated from high school. When website operators develop security questions, they have to think about how to prevent unauthorized access rather than simply creating easily verifiable questions so that the user can retrieve his or her password. Obviously these questions can’t get too personal, but something more than simple “Facebook” information is needed. The best option might be for the user to create his or her own security question and provide an answer.

Websites Must Allow Special Characters and Minimum Length in Users’ Answers

Several websites prohibit users from including special characters in their answers to security questions, making them vulnerable to brute-force attacks. Employing special characters; e.g., !, @, #, *, etc., would help defend against these attacks. Furthermore, websites often don’t impose any minimum character requirement for these answers. For example, a user could answer the question as “ABC” or “123”—or any other Michael Jackson lyric. Statistically, the longer a password—or answer to a security question—the more difficult it is for someone to guess. Just as sites often require a user’s password to be at least eight characters, the answer to someone’s security question should be equally complex.

Users Should Make Their Answers Unresponsive to Security Questions

As discussed above, a friend or family member could try to access your account, albeit possibly for a legitimate reason, but this person doesn’t know your password. However, he or she can easily answer what year you graduated from high school, or what street you first lived on or your favorite sports team. If you provide an answer to the question that isn’t responsive to the question, it decreases the likelihood of unauthorized access. For example, if the question asks you which year you graduated high school, you might answer “computer.” If the question asks for the make of your first car, your answer could be “wall” or “desk”—yes, Ron Burgundy, I am just looking at things in the office and using them as security answers. Or your answer could even just be a series of numbers. This may seem counterintuitive, since the user could have more difficulty remembering the answer, but it also better protects against unauthorized access since it is very unlikely that a hacker would try to answer the question in a nonresponsive way.

Jordan Holz is an attorney with the Association of American Medical Colleges focusing primarily on data privacy/security and investigations. He graduated from Fordham University School of Law in 2011 where he served as a Notes & Articles Editor for the Fordham Intellectual Property, Media and Education Law Journal.

Written By

Jordan Holz, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Spots Going Fast

With the top minds in the field leading this exceptional program, it's no wonder it's filling quickly. Register now to secure your spot.

Be Part of Something Big: Join the Summit

Registration is open for the Global Privacy Summit 2016. Discounted early bird rates available for a short time, register today!

Data Protection Intensive Returns to London

Registration is now open for the IAPP Europe Data Protection Intensive in London. Check out the program!

P.S.R. Call for Speakers Open!

P.S.R. is THE privacy + cloud security event of the year, and you can take a leading role. Propose a session for this year's program.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»