{"title":"Passwords: The cyber security lesson that was never learned?","authors":"S. Furnell","doi":"10.12968/s1361-3723(22)70587-8","DOIUrl":null,"url":null,"abstract":"Throughout the years, passwords have enjoyed the curious distinction of being both the most maligned and the most widely used aspect of cyber security. We know their weaknesses and people tend to use them badly, yet they continue to be deployed in ways that have allowed poor practices to continue. As a result, the same problems have persisted and we have appeared reluctant to learn the lessons that would improve the situation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"42 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70587-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Throughout the years, passwords have enjoyed the curious distinction of being both the most maligned and the most widely used aspect of cyber security. We know their weaknesses and people tend to use them badly, yet they continue to be deployed in ways that have allowed poor practices to continue. As a result, the same problems have persisted and we have appeared reluctant to learn the lessons that would improve the situation.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.