Explain the weaknesses of the current approach

Assignment Help Computer Engineering
Reference no: EM132294304

Assignment: Across the web are thousands of sites with varying levels of password complexity requirements. As we know, the suggested password recommendations from NIST and other governments have been updated recently to reflect a better understanding of how people use passwords, and how to create usable, strong passwords. Your assignment is to act as a security consultant to the fictional company of ACME, Inc. You have been brought in to address issues of authentication inside the organization.

Currently the company requires 8 character passwords rotated every 30 days. The company currently has no multi-factor authentication option.

Your assignment is to choose one component of recommended authentication practice and present a persuasive presentation to convince executives at the company to adopt your recommendation. Your presentation should include the following components:

• Risks of the current policy (make some assumptions here if you have to. If you have previous employment experience, assume this company uses the same policy as your previous company. State what the policy is). Explain the weaknesses of the current approach.

• Description of your recommended solution: specific product recommendations, including costs if applicable.

• Costs and benefits of your proposed solution. Include a qualitative or quantitative risk analysis.

• Sources: When you make claims about security (which you should), back them up with sources.

Make sure you check out the content from Week 12 Videos before starting the assignment.

Potential topics

• Multifactor authentication

• Enterprise password managers

• Password policy

• Other related ideas

Deliverable: A 10-minute presentation (slides and presentation notes). You do not need to record the presentation, but your presentation materials should be complete with notes so that someone (like me) who is familiar with authentication security could give your presentation for you.

Reference no: EM132294304

Questions Cloud

What you have learned to your professional lives : In this discussion question you have the opportunity to be creative and to relate what you have learned to your professional lives.
Identify the common purpose of attacks : Identify the common purpose of attacks on point-of-sale (POS) systems. Assess why and how these POS systems have become a prime target for hacking groups.
Analyze the community health nurse in public health setting : Analyze the community health nurse in a public health setting and list and describe the different roles".
What information is pertinent to your clients case : She has a 7-year history of respiratory illness, which occurs several times throughout the year, not seemingly connected to the changes in season.
Explain the weaknesses of the current approach : Risks of the current policy (make some assumptions here if you have to. If you have previous employment experience, assume this company uses the same policy.
List the anti-trust court cases mentioned by the panel : List the anti-trust court cases mentioned by the panel. Describe the competition issue related to each court case mentioned in this video.
Identify and cite one federal statute : Please identify and cite one federal statute which influences commerce on the internet and summarize (in not less than 100 words) what that statute accomplishes
What is an example of a managers salary package : At the time of this article, what is the current value of the stock? What has been the increase in value since 2005?
Where within the case did you discover the information : Based on your reading of the case, provide a brief, one sentence summary of what you know about each of the things on your list.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Load the file into the parallel arrays

Load the file into the parallel arrays and show the list of customers` names and phone numbers in the alphabetical order.

  Construct a legal tree of gates

Construct a legal tree of gates which minimizes the total cost of the tree subject to the constraint that the arrival time at the output is no greater than tmax. Use dynamic programming to solve this

  Evaluate the momentum thickness and displacement thickness

Solve the laminar boundary layer for constant free-stream velocity, using the momentum integral equation and an assumption that the velocity profile.

  Write a program that reads the data from the file produced

Write a program that reads the data from the file produced in Part A, and produces a report showing the courses taught .

  Create an application role named midtermapp

Create an Application Role named MidtermApp, and give it your default password. Create the following users and groups on the local Windows Server.

  What is the agglomerative clustering tree for given points

What is the agglomerative clustering tree for these points under Single-link clustering, Average-link clustering and Complete-link/furthest-neighbor clustering.

  What is the value of x

Assume that a vector processor operates 20 times faster on vector code than scalar code. If only x% of the program is vectorizable, what is the value of x.

  How would you apply the three concepts you identified

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.

  What are seven basic step in reviewing computer-based system

What is the preliminary review portion of an audit and why is it important? What are the seven basic steps in reviewing computer-based systems?

  Write the definition of a function square

Write the definition of a function square, which receives an integer parameter and returns the square of the value of the parameter .

  Write a java program that will input two numbers

Write a java program that will input two numbers and display their sum and product.

  Create an undo tablespace with a single data file

Simulate a problem with undo. You will need to be connected as user SYSTEM or some other user to whom you have granted the DBA role.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd