Abstract
<jats:p> Although we are continually offered the promise of passwords being eradicated they continue to be used extensively on the majority of devices, sites and services. <jats:sup>1,</jats:sup> <jats:sup>2</jats:sup> At the same time, they remain a significant point of weakness – particularly in view of the way in which users choose and manage them. For example, in 2017, Verizon's ‘Data Breach Investigations Report’ suggested that 81% of hacking-related breaches had “leveraged either stolen and/or weak passwords” (with 62% of breaches overall having featured hacking). <jats:sup>3</jats:sup> </jats:p>
Original language | English |
---|---|
Pages (from-to) | 6-14 |
Number of pages | 0 |
Journal | Computer Fraud & Security |
Volume | 2019 |
Issue number | 11 |
DOIs | |
Publication status | Published - Jan 2019 |