Creating good password security

Assignment Help Basic Computer Science
Reference no: EM132541311

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords such as common names, real words, numbers only require special characters and a mix of caps, lower case and numbers in passwords.

2. Reauthenticate before changing passwords user must enter old pw before creating new one

3. Make authenticators unforgeable do not allow email or user ID as password

Using WORD, write a brief paper of explaining each of these security recommendations. Do you agree or disagree with these recommendations? Would you change, add or delete any of these? Add additional criteria as you see necessary.

 

Reference no: EM132541311

Questions Cloud

Choose one good and one bad advertisement and describe : Based on the experience (knowledge) of the students in this class, please choose one good and one bad advertisement and describe the reasons.
Discuss five vectors of progress that can overcome barriers : Discuss the five vectors of progress that can overcome barriers to blockchain's adoption. You are required to cite this week's assigned readings
Leadership paradox and inter-team relations : What is the leadership paradox? What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience?
Popular countries for IT outsourcing : According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing.
Creating good password security : Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords:
What are the limitations of dashboards : Explain how executive dashboards can lead to better business insights. What are the limitations of dashboards?
Describe a specific type of basketball shoe to market : Describe the price for this product, describe the place involved with marketing and selling this product, and a promotional strategy to market the product.
Cloud services differ from coordinated cloud strategy : What contributes to the complexity of a cloud strategy? How does tactical adoption of cloud services differ from a coordinated cloud strategy?
Prepare a positioning statement : Prepare a positioning statement.Write an introduction to your company. Describe your company, its location, and the product it makes or the service it provides

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Cameras and scanners being used in some medical offices

How are digital cameras and scanners being used in some medical offices? Can you think of some additional or innovative uses for these device in a medical office?

  Dynabase tool has forecast its total funds requirement

Dynabase Tool has forecast its total funds requirement for the coming year as shown in the following table:

  Role of cognitive psychology in the design of user interface

To enable students to select and justify the choice of appropriate input/output devices and communication styles for interactive systems - You are given the opportunity to evaluate a user interface prototype which was designed according to the bri..

  Create a distributed web crawler and indexer

Create a distributed web crawler and indexer. Your application should make use of a system that uses multiple crawler processes to traverse a set of websites and process or organize the data in a way that is easy to search.

  Economic determinants of health

Contrast the following approaches to the economic determinants of health:

  Estimate your project budget

You were given control of a project. You have properly defined your project. Now, it is time to estimate your budget.

  Explain that our ability to secure each computers stored

Explain that our ability to secure each computers stored information is now influenced by the security on each computer to which it is connected

  Write a function named time() that has an integer parameter

The function is to convert the passed number of seconds into an equivalent number of hours, minutes, and seconds. Using the reference parameters, the function should alter the arguments in the calling function.

  Greatest challenges facing software engineering

Identify the greatest challenges facing software engineering in the next 20 years. Highlighting the challenges and problems that software engineers have dealt.

  Describe example of implemented database

Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up.

  Data examination-identifying physical properties and meaning

Data examination- Identifying physical properties and meaning. Data transformation- Enhancing your data through modification and consolidation

  Calculating value of revenue by using formula

Define Header files.  Define test()function.Declare revenue() function.Declare predict() function.Declare roundMoney() function.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd