A-Z Popular New Security Search »
Information Security
 
Related Guides

6 Types of Password Fatigue

 , updated on
Password fatigue is the stress that users experience due to requirements to create, re-enter, remember and change a large number of passwords. This can be a customer and employee satisfaction issue. Password fatique can also be a security issue as requirements to remember and enter passwords frequently encourages users to select simple passwords, write them down and reuse them across multiple systems. The following are several policies that may lead to password fatigue.

Complex Requirements

Highly specific password requirements that force users to jump through hoops to create a password. For example, a website that has 8 different requirements for passwords instead of dynamically judging the complexity of passwords. Users find it particularly difficult to use mixed case passwords.

Password Expiry

Disrupting a user's task flow to ask them to change their password. Users tend to rush through things that interrupt their flow resulting in weak or forgotten passwords.

Session Expiry

When a user's session times out and they need to logon again.

Lack of Single Sign-on

When a user is forced to reenter a password when traversing related sites or applications.

Blocking Password Managers

Blocking password managers that auto-fill passwords may be perceived as a bug on your site. Encourages simple and reused passwords. Forces user to create an except for you resulting in satisfaction issues.

Disallowing Characters

In some cases, older sites disallow a number of characters in passwords. This both makes passwords less complex and increases password fatigue as users struggle to understand why you can't except their chosen password.
Overview: Password Fatigue
Type
Definition
The stress that users experience due to requirements to create, re-enter, remember and change a large number of passwords.
Related Concepts
Next: Password Paradox
More about information security:
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.

Cybersecurity

A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.

Sandbox

A definition of sandbox with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map