Explaining each of the security recommendations

Assignment Help Computer Network Security
Reference no: EM132533708

Question: An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

• such as common names, real words, numbers only

• require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

• user must enter old pw before creating new one

3. Make authenticators unforgeable

• do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necesarry.

Reference no: EM132533708

Questions Cloud

Which system is easier to use : How does this issue relate to the material covered? Identify activities and costs at the restaurant that fall into each of the categories
How zurich has created new value through the erm program : This case study focuses on how Zurich uses a variety of methodologies and tools to manage its business risk. Zurich's risk profiling is a focused.
Retirement asset value : What is retirement asset value needed on first day of retirement, plus any additional annual savings needed per year, to fully meet capital depletion retirement
Discuss some of the non-quantitative factors : Although this case differs from "fraud" in the usual sense, describe the conflict of interest in this case. Who benefitted, and who did not?
Explaining each of the security recommendations : Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations.
Will cari be able to maintain such a minimum balance : Will Cari's be able to maintain such a minimum balance for each month? If not, what cash management strategy do you recommend and why?
What are the three distribution methods available to annette : What are the three distribution methods available to Annette? Which method should she choose to maximize tax deferral?
Calculate schedule of cost of goods sold for nani fashions : Calculate the schedule of cost of goods sold for Nani's Fashions and explain the information provided by the schedule of cost of goods sold.
Define what is your biggest security concern : What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is cyberstalking

Do you think that they should have used these laws to prosecute Drew - What is cyberstalking? Research the Megan Meier case. Do you agree with the ruling?

  Provide an overview of three different vulnerabilities

Provide overview of 3 different vulnerabilities that were introduced by virtualization and method by which organization are mitigating security vulnerabilities.

  Develop a paper about child-pornography

Develop a 12 pages paper about child-pornography - You need to submit a 12 pages paper about child-pornography.

  What are the risks associated with logging too many events

What are the risks associated with logging too many events? When the default configuration is to create audit logs, what impact can this have on security.

  Describe the three principles of ip security

Describe 'The Three Principles of IP Security'. Cite references as well as a detailed explanation for the same. Explain how you would as an employee of a company practice those principles

  Produce a set of eight words of length

Produce a set of eight words of length six by applying this technique to the first position of the Hamming [7, 4] code.

  Mitigate risk by using information security systems policies

Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies

  What are some firewall implementation best practices

What are some firewall implementation best practices? Include how to examine the network and its security needs in your post.

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  How will ids and passwords be properly maintained?

How will IDs and passwords be properly maintained?

  What default decision do you recommend its incident response

What default decision do you recommend its incident response policy dictate regarding disconnecting this system from the Internet to limit damaging publicity?

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd