Discussion about the about creating good password security

Assignment Help Computer Engineering
Reference no: EM132707332

Question: Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

• such as common names, real words, numbers only

• require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

• user must enter old pw before creating new one

3. Make authenticators unforgeable

• do not allow email or user ID as password

Using WORD, write a brief paper of 300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necessary.

Reference no: EM132707332

Questions Cloud

Discussing components of the coso framework : The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five.
Which alternative is more cost effective and by how much : Compostela Farms, Inc. grows and sells tomatoes and tomato products. Each plot yields 1,500 pounds, Which alternative is more cost effective and by how much?
Discuss the impact of thousands of lobbyists : Discuss the impact of thousands of lobbyists in Washington DC and millions of dollars spent every year to change federal policies.
When the revenue should be recognized for each performance : When the revenue should be recognized for each performance obligation under IFRS. Support your answer by explaining why it should be recognized
Discussion about the about creating good password security : Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords.
Calculate the number of equivalent units for both materials : Calculate the number of equivalent units for both materials and conversion for the month of May, assuming that the company uses the weighted-average method.
Summarizing key policy changes over its history : Describe the issue briefly, including summarizing key policy changes over its history.
Discuss about the penetraton testing : Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting.
What is the stores total profit when sets of curtains sold : What is the stores total profit when 200 sets of curtains are sold? (round to whole dollar, no decimals)

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many signal wires are need in direction for operation

How many signal wires are needed in each direction for 16x operation? What is the gross capacity each way? What is the net capacity each way?

  Discuss the costs of compromised data integrity breaches

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education.

  What is the difference between a set and a map

What is the difference between a set and a map? Why is the collection of keys of a map a set and not a list? Why is collection of the values of a map not a set?

  Write the monthly sales amounts to a file

Using Visual Logic, write the monthly sales amounts to a file, monthly_Sales.dat. (Hint: be sure to enter a sentinel value for end of file processing later.)

  Which applications running in data centers are candidates

What questions wil lbe useful to investigate when deciding which applications running in data centers are candidates for migration to the cloud environment.

  Find an encryption method that has been used historically

Find an encryption method that has been used historically but is no longer used. One example is the Enigma cipher of the Germans in WWII (Do not use this).

  Explain how quantum cryptography works

Write a paper outlining a position on the use of Quantum cryptography. What problem is quantum cryptography solving? explain. Detail how quantum cryptography.

  Diagram showing the relationship between ecx and cx

Draw a diagram showing the relationship between ECX, CX, CH, and CL registers.

  How does the device file help in accessing the device

How does the device file help in accessing the device? Which of these commands will work? Explain with reasons mkdir a/b/c and mkdir a a/b.

  Discuss first interaction with the customer should privacy

How dos ethics fit in the SDLC is an easy question as from the very first interaction with the customer should privacy protection be engaged

  Determine behavior changes to adapt agile project management

Determine the behavior changes you must make on your own to adapt Agile project management in the situation described in Part 1 of this discussion.

  Write and assemble a program to load values

Write and assemble a program to load values into each of registers R20 - R24 and then push each of these registers onto the stack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd