Password Vulnerability and Strength Ratings
Data Science and Analytics
Tags and Keywords
Trusted By




"No reviews yet"
Free
About
This dataset provides insights into password popularity, crack times, and strength ratings. It offers a glimpse into common password choices and their associated vulnerabilities. The data is sourced from Information is Beautiful, with additional details available regarding password quality and strength. It is important to note that the "strength" column within this dataset is relative to these generally poor passwords, and they should not be used as examples of secure credentials. The dataset serves as a valuable resource for understanding the characteristics of widely used and easily compromised passwords.
Columns
- rank: Indicates the popularity of the password within a database of released passwords.
- password: The actual text string of the password.
- category: Describes the classification or type the password falls into.
- value: Represents the time it would take to crack the password through online guessing.
- time_unit: Specifies the unit of time associated with the 'value' column (e.g., days, months).
- offline_crack_sec: Shows the estimated time to crack the password offline, expressed in seconds.
- rank_alt: An alternative ranking metric for the passwords.
- strength: Reflects the quality of the password on a scale where 10 is the highest and 1 is the lowest. This rating is relative to generally weak passwords.
- font_size: A numerical value originally used for creating the graphic by KIB.
Distribution
The dataset is provided in a CSV file format, specifically
passwords.csv
. It contains 9 columns and 507 valid records across all listed variables. The file size is 24.26 kB. Data files are typically in CSV format, with sample files updated separately.Usage
This dataset is ideal for:
- Analysing password trends and common weaknesses.
- Researching cybersecurity vulnerabilities related to user-chosen passwords.
- Developing educational materials to raise awareness about poor password practices.
- Studying user behaviour in password creation.
- Exploring the effectiveness of different password cracking methods over time.
Coverage
The dataset focuses on a selection of common, often weak, passwords and their associated characteristics. It does not specify geographic, time-range, or demographic scopes. The data highlights a general collection of "bad" passwords.
License
CC0: Public Domain
Who Can Use It
- Cybersecurity Analysts: To study password attack vectors and security risks.
- Researchers: For academic studies on human factors in security and password strength.
- Security Trainers and Educators: To illustrate examples of weak passwords and the importance of strong credential management.
- Application Developers: To understand common vulnerabilities when implementing authentication systems, though it is not recommended to use these specific passwords for blacklisting without further context, as the 'strength' is relative.
- Data Scientists: For statistical analysis and pattern recognition in password data.
Dataset Name Suggestions
- Password Vulnerability and Strength Ratings
- Common Password Analysis
- Weak Passwords Dataset
- Password Crackability Index
- Information is Beautiful Password Data
Attributes
Original Data Source: Password Vulnerability and Strength Ratings