Using Secret Questions (2024)

OWASP - Mark BurnetNovember 11, 2005 To help verify a user's identity in the case of a lost password, many Web applications use secret questions. By answering a pre-selected question, a user can demonstrate some personal knowledge of the account owner. A classic example is asking to provide a mother's maiden name.

Answering secret questions requires some knowledge of the user account, but secret questions break all the rules for strong passwords and have some significant weaknesses:

" An attacker can sometimes discover the information with little research;
" The answer to the question is usually a fact that will never change;
" Users reuse the same secret questions and answers across multiple Web sites;
" Someone close to the individual could know the answers to many of the questions;
" People rarely change their secret questions;
" The answers are often case-insensitive and usually contain a limited character set;
" Some questions have a limited number of answers; and
" With some questions, many people will have the same common answers.
Secret questions usually ask for an obscure fact that hopefully only the account owner would know and supposedly would never forget. Many Web sites assume that the user providing the answer to the question is sufficient to identify the user. However, many secret questions ask for facts that anyone could discover with little research. To make things worse, if someone discovers this information, you cannot just change a fact from the past.

Countless Web sites provide great tips on avoiding easily guessed passwords but then turn around and ask for a pet dog's name or what city you were born in to answer a secret question.

Even if an attacker knows nothing about the target user, the nature of secret questions limits the possible range of answers. For example, consider the questions and ranges of answers shown in Table 1. As the table shows, many secret questions have so few possible answers that a brute-force attack against these secret questions is completely feasible. To make matters worse, some Web sites fail to detect or prevent brute-force attacks against secret questions. For years, security experts have told people to avoid using pet names, family names, or dates in passwords, but secret questions go directly against that advice.

The key to properly using secret questions is to understand that they should never be the equivalent of a password. You should only use them to initiate a password reset, to prevent anonymous attacks against the password reset process. Providing the answer to a secret question should never be enough to validate a user, but combined with other factors, such as having access to the user's e-mail account, secret questions can be effective in helping to identify a user.

The greatest threat with secret questions is that the answer is usually fixed and an attacker can sometimes discover this information through research. Because there is usually a limited set of answers to secret questions, they are also vulnerable to brute-force attacks. Finally, secret questions are usually ineffective against attacks by people close to the user. Individuals such as ex-spouses, once-close business associates, or wayward teenage children may have sufficient information and sufficient motivation to break into a user's account.

Designing Secret Questions

The key to successful secret questions is to clearly define their role as just one part of the password retrieval process. They prevent password resets without some personal knowledge of the user. Design the system to be flexible with secret questions and answers, allowing users to disable secret questions or requiring a telephone call for final confirmation. Another effective technique for security-sensitive Web applications is to allow or require users to answer more than one secret question.

Avoid allowing users to select their own questions, since most users are not qualified to select strong enough questions. Sites that allow users to select their own secret questions end up with insecure questions such as:

" What year were you born?
" What is your password?
" What is the capital of Georgia?

Select effective questions, carefully considering the possible range of answers as well as the likelihood of common answers. Use unique questions, and try to avoid subjects that return short, one-word answers. Also, try to avoid questions that others commonly use, such as mother's maiden name, pet name, or high school. But keep in mind that you should ask questions that users will always answer the same way.

Establish a large list of questions, but provide a short, random list from which users can select their own questions. For users more concerned with security, you might want to provide an advanced option to select from a larger list of secret questions.

If the user provides a predetermined number of incorrect answers to the security question, you might not want to return an error, but instead send the user an e-mail explaining that he or she answered incorrectly. This will prevent brute-force attacks against the secret question process and alert users to a possible attack against their accounts.

Using Secret Questions (2024)

FAQs

Are security questions still valid? ›

Security questions are meant to help reset passwords, reopen locked accounts, and ultimately protect your digital spaces from attacks or breaches, but such safeguarding is widely considered flawed and unreliable .

Are security questions a good idea? ›

While security questions are secure in theory, they do not always stand the test of real-life use. They can be hacked just like a password, for example.

What is secret questions and answers? ›

Secret questions usually ask for an obscure fact that hopefully only the account owner would know and supposedly would never forget. Many Web sites assume that the user providing the answer to the question is sufficient to identify the user.

What should I write in secret question and answer? ›

Do use a question and answer that generally only you will know. Do use a question that is enduring (e.g. mother's maiden name, the name of your first pet, etc.) Do not use a question and answer that may change over time (e.g. name of your best friend, your favorite song, etc.)

What are the disadvantages of security questions? ›

The Drawbacks of Security Questions

One notable disadvantage is that security questions can be vulnerable to social engineering attacks. Hackers who have knowledge about a person's personal life through social media or other sources may be able to guess the answers to these questions and gain unauthorized access.

Do security questions have to be exact? ›

Security questions shouldn't have multiple potential answers. Pick something precise, simple, and straightforward. And don't try to be cheeky and go with a fake answer, lest you outsmart yourself and forget it two months down the line. Consistent.

What is a strong security question? ›

There are five criteria that make a security question good: Confidential: Something that can't be easily guessed or researched. Memorable: Easy to remember no matter how much time has passed. Consistent: An answer that can't change over time.

How many security questions should be asked? ›

The purpose of security questions is to protect your business against cyberattacks, so ask as many questions as possible and confirm the user's identity before letting them in. Hackers may breach a single security question. However, asking multiple questions improves your security system.

Who uses security questions? ›

A security question is form of shared secret used as an authenticator. It is commonly used by banks, cable companies and wireless providers as an extra security layer.

What is a valid secret question? ›

Secret questions are used for account security purposes. If you choose the question then any other security question is a red flag that something is not right. It should also be a question to which only you know the answer. This does not mean that it must actually answer the question, though.

What are deep questions no one can answer? ›

Top 30 impossible questions
  • What does God look like?
  • What came first, the chicken or the egg?
  • Where do you go when you die?
  • What are black holes?
  • Why is water wet?
  • Why do people die?
  • How did the world begin?
  • Where do babies come from?

How secure are your security questions? ›

Security questions' answers are too easy to hack

Security questions' answers can be discovered by: Conventional hacking techniques. Like any personal data, intruders can use social engineering like phishing to breach your data or your security answers themselves.

What is the killer question? ›

‍ Killer questions are most often used when you need to further screen your candidate pool. During the interview process, they are used to demonstrate to the interviewers how the candidate thinks, problem solves, or strategises. In all cases, killer questions are a useful way to narrow in on the candidate you want.

What are two main security questions? ›

There are two main types of security questions:
  • User-defined questions let users choose a question from a set list that they would like to provide an answer to. ...
  • System-defined questions are based on information that the service provider already knows about the user (e.g., address or date of birth).
Mar 4, 2021

Are security questions a form of MFA? ›

Multi-factor authentication (MFA) factors are typically divided into three categories: Knowledge: Requires users to prove they know something (e.g., passwords or security question answers). Possession: Requires users to prove they own something (e.g., a security key or a device to generate OTP).

What is an example of a strong security question? ›

Good security questions should have answers that are easy for the user to remember but difficult for someone else to guess. For example, questions about personal preferences or experiences can be effective, such as “What is your favorite movie?” or “What was the name of your first pet?”

What if I forgot the answer to my security question? ›

If you forgot both your security question answers, there are two things you can do. If you have a computer that you have chosen to “Remember computer” on, you can log in on that computer and reset your security questions.

What is the most common security question? ›

Here are examples of some common security questions:
  • In what city were you born?
  • What is the name of your favorite pet?
  • What is your mother's maiden name?
  • What high school did you attend?
  • What was the name of your elementary school?
  • What was the make of your first car?
  • What was your favorite food as a child?
Jul 26, 2022

Top Articles
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 5594

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.