How Common Security Questions Can Pose a High Risk | BeyondTrust (2024)

Every individual who has online accounts to access services or applications invariably has had to establish answers to security questions. We logon to a new bank account, social media service, or check out via our favorite online paid service, and we are required to enter initial responses to security questions. The purpose of these questions is to periodically re-affirm our identity, or to regain access if we forget our password, by providing our personal secret answers.

Here are examples of some common security questions:

  • In what city were you born?
  • What is the name of your favorite pet?
  • What is your mother's maiden name?
  • What high school did you attend?
  • What was the name of your elementary school?
  • What was the make of your first car?
  • What was your favorite food as a child?
  • Where did you meet your spouse?
  • What year was your father (or mother) born?

Why Are Common Security Questions a Problem?

The problem with common security questions (and with our answers) is they become a liability when the results are leaked online, such as through a data breach, or become public knowledge via outlets like social media. Why? Because many (in fact, thousands) of sites potentially use identical security questions. The variation from site-to-site is low, and questions for each user frequently, and inevitably, overlap across their many accounts. This standardization of security questions creates a substantial, but unnecessary, risk.

The threat of common security questions is comparable to reusing passwords. Security pros, and end users, should know they should never reuse a password across accounts. This is because, if one account is compromised, the password is no longer secret and is associated with your credentials/identity and could be used for future attacks against any account you own that has the same (or similar) usernames. When passwords are re-used across dozens of accounts, the compromise of just one account could potentially lead to the compromise of all the other un-related accounts and ultimately your identity.

How Do I Make My Security Questions Stronger?

While we do usually have control over the passwords we choose, as individuals, we do not have the power to change the security questions these websites and services require. However, we can answer these questions in creative ways to make our accounts more secure and eliminates the threat of multiple accounts being compromised. Here is some basic guidance on how make security questions stronger:

1. Choose Different Security Questions Across Sites: As much as is possible, do not select the same security questions across multiple sites. Keep your selections unique when the site allows you to pick your own questions. This will help limit the fallout and compromise of other accounts if the security question/answer is ever leaked. This is especially important for public figures whose history may be a part of public record or biographies posted on websites. For example, we all know the city our favorite musician or actor was born in, right?

2. Use Special Characters in Your Answers: Do not answer security questions in plain English (or your native language). That is what is expected, but it’s a security misstep. Treat your answers like passwords and introduce complexity in your response and its characters. For example, let’s say I was born in Little Rock, Arkansas. The security question for, “what city where you born in” would require the response, “Little Rock”. Now, add some password complexity. The new entry could therefore be, “L!ttl3 r0ck”. This answer is more difficult to guess or crack through automated tools and provides a simple layer of obfuscation to protect your security question responses. And, if anyone ever asks, you can honestly state your mother’s maiden name does have numbers and symbols in it. Doesn’t yours? I think you get the point—a little obfuscation can go along way to secure your answers.

3. Use Fictitious Information: In many instances, the best course of action is to provide fictitious information to these questions to keep them unique. You could use a personal password manager to populate the answer fields with password-like responses. Next, store each question and response in your password manager. For example, for an ecommerce site, you could create the entry “ecommercesite.com/question_birthcity” as the account and then enter a random, recommended password as the security response. This provides the secure storage you need in case of a password problem, while keeping your answers to same security question completely random and unique across sites and applications.

Why Mitigating the Use of Common Security Questions Is Important

Security questions were designed with the intent of strengthening identity validation for access to applications and websites, particularly in the case of a password issue or other fault. However, just as with password reuse, reusing security question and answer pairs across multiple sites has enabled threat actors to compromise many accounts associated with an identity. Typically, this requires a hacker to compromise a secondary application as well, like email or SMS texting, to pair a password reset with the knowledge of these security questions. Unfortunately, some websites and applications do not even go that far, and knowledge of a security question answer is sufficient to compromise the account, if the user provide the correct response

For IT and security professionals interested in a more rigorous and thorough examination of all the ways identities (corporate and personal) are at risk or under attack, and the best strategies for protecting them, check out: Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution, a book co-authored by Darran Rolls, former CTO at SailPoint, and I. You can also watch our joint webinar on-demand here: Deconstructing Identity as a Cyberattack Vector.

This blog has been updated since it was originally published on June 4, 2020.

How Common Security Questions Can Pose a High Risk | BeyondTrust (2024)

FAQs

How Common Security Questions Can Pose a High Risk | BeyondTrust? ›

The problem with common security questions (and with our answers) is they become a liability when the results are leaked online, such as through a data breach, or become public knowledge via outlets like social media. Why? Because many (in fact, thousands) of sites potentially use identical security questions.

What are common security questions? ›

Basic Types of Secure Questions

Family (What year was your grandmother born?); Preferences (What is your favorite sport?); First (What month was your first child born?); Personal characteristics (What is your skin color?);

Are security questions a security risk? ›

If the answers to your security questions are ever compromised, it can lead to widespread privacy violations. Identity theft: With access to something like your bank account, it wouldn't take much work for an attacker to impersonate you, open new accounts, or commit fraud with your stolen identity.

What is an example of a security question and answer? ›

A good security question should have a fixed answer, meaning that it won't change over time. A good example of a security question with a stable answer: “What is your oldest cousin's first name?” This example works because the answer never changes.

Are security questions still valid? ›

Answers can be hacked

While security questions are secure in theory, they do not always stand the test of real-life use. They can be hacked just like a password, for example.

How to answer the security questions? ›

Make answers to the security questions just as strong as your passwords. “Statistically, the longer a password — or answer to a security question — the more difficult it is for someone to guess,” as Jordan Holz, CIPP/US, advises in a post via International Association of Privacy Professionals (IAPP) website.

What are the 4 C's security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What makes a security risk? ›

Security risk is a type of risk that involves the potential for loss or damage to an organization's assets, data, and reputation due to malicious activities. It can be caused by external threats such as hackers, malware, viruses, or internal threats such as employee negligence or malicious intent.

What are the three types of security risks? ›

The main types of information security threats are: Malware attack. Social engineering attacks. Software supply chain attacks.

What is the most common security threat? ›

Malware Threats
  • Viruses and Worms. Viruses and worms are some of the oldest types of malware but remain highly effective due to their evolving mechanisms. ...
  • Ransomware. ...
  • Cryptojacking. ...
  • Fileless Malware. ...
  • Phishing Variants. ...
  • Baiting and Pretexting. ...
  • Business Email Compromise (BEC) ...
  • Distributed Denial of Service Attacks.

How do I create a strong security question? ›

What makes a good security question?
  1. Memorable. The answer to the question should immediately pop into your head, even if you're logging in two years after you first created the account. ...
  2. Unique. ...
  3. Consistent. ...
  4. Unpredictable.
Mar 14, 2023

What is security question hint? ›

A security question is just another form of a password mechanism. Therefore, a security question should not be shared with anyone else, or include any information readily available on social media websites, while remaining simple, memorable, difficult to guess, and constant over time.

What are the questions for security? ›

Top Security Guard Interview Questions
  • What Made You Choose a Security Guard Job?
  • Have You Previously Worked as a Security Guard? ...
  • How Do You Identify Potential Security Breaches or Threats?
  • How Do You Handle Potentially Dangerous Situations?
  • Do You Have Any Experience With Surveillance Equipment?

What are the benefits of security questions? ›

The security questions help verify your identity to prevent unauthorized access or changes to your financial, health benefits or personal information.

What are the best security questions? ›

Examples of good security questions
Effective Security QuestionRationale
What is your oldest sibling's middle name?Typically, this is something intimately known between siblings and difficult for others to research.
What was the first concert you attended?The answer isn't prone to change.
3 more rows
Mar 4, 2021

Are security questions a form of MFA? ›

When to Use Security Questions. Applications should generally use a password along with a second authentication factor (such as an OTP code) to authenticate users. The combination of a password and security questions does not constitute MFA, as both factors as the same (i.e. something you know)..

What are the 5 C's for security guard? ›

Change, Compliance, Cost, Continuity, and Coverage; these are all basic considerations for any organization.

What are the 5 security questions at airport? ›

8 Airport questions you need to be able to answer in English
  • Do you have an e-ticket or a paper ticket? ...
  • Are you checking in baggage or carrying on? ...
  • Would you like a window or aisle seat? ...
  • May I see your boarding pass? ...
  • Which gate should I board from? ...
  • Is my flight delayed or on-time? ...
  • Do you have anything to declare?

Top Articles
How to Use Windows Defender to Scan for Malware | NinjaOne
Script publishing rules
Koopa Wrapper 1 Point 0
Bj 사슴이 분수
Ghosted Imdb Parents Guide
Amtrust Bank Cd Rates
Free VIN Decoder Online | Decode any VIN
Concacaf Wiki
Best Private Elementary Schools In Virginia
Fire Rescue 1 Login
Mercy MyPay (Online Pay Stubs) / mercy-mypay-online-pay-stubs.pdf / PDF4PRO
Red Heeler Dog Breed Info, Pictures, Facts, Puppy Price & FAQs
Tripadvisor Near Me
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
Nonne's Italian Restaurant And Sports Bar Port Orange Photos
Hoe kom ik bij mijn medische gegevens van de huisarts? - HKN Huisartsen
Byte Delta Dental
Swgoh Turn Meter Reduction Teams
Sadie Proposal Ideas
Publix Super Market At Rainbow Square Shopping Center Dunnellon Photos
China’s UberEats - Meituan Dianping, Abandons Bike Sharing And Ride Hailing - Digital Crew
Tinker Repo
Www.publicsurplus.com Motor Pool
11 Ways to Sell a Car on Craigslist - wikiHow
Hesburgh Library Catalog
Cardaras Funeral Homes
Skymovieshd.ib
Vht Shortener
Why Are The French So Google Feud Answers
How to Get Into UCLA: Admissions Stats + Tips
Lake Dunson Robertson Funeral Home Lagrange Georgia Obituary
Truckers Report Forums
Afspraak inzien
Caderno 2 Aulas Medicina - Matemática
8005607994
Restored Republic June 6 2023
Wilson Tattoo Shops
Best GoMovies Alternatives
Differential Diagnosis
Winta Zesu Net Worth
Denise Monello Obituary
Pgecom
Tacos Diego Hugoton Ks
Verizon Forum Gac Family
Craigslist Pets Charleston Wv
Fresno Craglist
Where and How to Watch Sound of Freedom | Angel Studios
Craigslist Cars And Trucks For Sale By Owner Indianapolis
How To Win The Race In Sneaky Sasquatch
Runelite Ground Markers
Naughty Natt Farting
Les BABAS EXOTIQUES façon Amaury Guichon
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 5584

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.