Vis enkel innførsel

dc.contributor.authorJuozapavičius, Aušrius
dc.contributor.authorBrilingaite, Agnė
dc.contributor.authorBukauskas, Linas
dc.contributor.authorLugo, Ricardo Gregorio
dc.date.accessioned2023-01-19T10:09:16Z
dc.date.available2023-01-19T10:09:16Z
dc.date.created2022-01-18T21:51:36Z
dc.date.issued2022
dc.identifier.citationApplied Sciences. 2022, 12 (2), Artikkel 894.en_US
dc.identifier.issn2076-3417
dc.identifier.urihttps://hdl.handle.net/11250/3044535
dc.description.abstractPassword hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour between various user groups remains an active research topic. The paper aims to identify the impact of age and gender on password strength using a large password dataset. We recovered previously hashed passwords of 102,120 users from a leaked customer database of a car-sharing company. Although the measured effect size was small, males significantly had stronger passwords than females for all age groups. Males aged 26–45 were also significantly different from all other groups, and password complexity decreased with age for both genders equally. Overall, very weak password hygiene was observed, 72% of users based their password on a word or used a simple sequence of digits, and passwords of over 39% of users were found in word lists of previous leaks.en_US
dc.language.isoengen_US
dc.publisherMDPIen_US
dc.relation.urihttps://www.mdpi.com/2076-3417/12/2/894
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectpasswordsen_US
dc.subjectpassword hygieneen_US
dc.subjectdata leaken_US
dc.subjectpassword strengthen_US
dc.subjectgender impacten_US
dc.titleAge and Gender Impact on Password Hygieneen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2022 by the authors.en_US
dc.subject.nsiVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550en_US
dc.source.volume12en_US
dc.source.journalApplied Sciencesen_US
dc.source.issue2en_US
dc.identifier.doihttps://doi.org/10.3390/app12020894
dc.identifier.cristin1984206
dc.source.articlenumber894en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal