Abstract
<jats:p> Although we are continually offered the promise of passwords being eradicated they continue to be used extensively on the majority of devices, sites and services. <jats:sup>1,</jats:sup> <jats:sup>2</jats:sup> At the same time, they remain a significant point of weakness – particularly in view of the way in which users choose and manage them. For example, in 2017, Verizon's ‘Data Breach Investigations Report’ suggested that 81% of hacking-related breaches had “leveraged either stolen and/or weak passwords” (with 62% of breaches overall having featured hacking). <jats:sup>3</jats:sup> </jats:p>
| Original language | English |
|---|---|
| Pages (from-to) | 6-14 |
| Number of pages | 0 |
| Journal | Computer Fraud & Security |
| Volume | 2019 |
| Issue number | 11 |
| DOIs | |
| Publication status | Published - Jan 2019 |
Fingerprint
Dive into the research topics of 'Password meters: inaccurate advice offered inconsistently?'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver