Problems with passwords authentication

Assignment Help Management Theories
Reference no: EM131052510

Problems with Passwords Authentication

Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret passwords. A secret password, known only to the user, allows an administrator to feel confident that a user is who the user says he or she is. Systems administrators even have the authority to determine the characteristics of passwords. For example, they may set a minimum length and require that a password include numbers, symbols, or mixed letter case. They may also require that a user change his or her password every few weeks or months. These approaches have numerous problems:

• Users often forget complicated or frequently changing passwords, resulting in frequent calls to a help desk. The help-desk employee then faces the burden of identifying the employee by some other means and resetting the password. This process takes time and is subject to social engineering.

• Users may write down their passwords. However, this leaves passwords subject to discovery and theft. • Users often pick the same password for many different accounts, which means that someone who discovers one of these passwords then has the "keys" to all the accounts.

• Users may pick an easy-to-remember password, which is easy to anticipate and therefore easy to guess. Password-cracking programs cycle through entire dictionaries of English language words and common word/number combinations such as "smart1" or "2smart4U."

• Users may give away their passwords over the phone (social engineering) or via e-mail (phishing, a type of social engineering) to individuals representing themselves as a system administrator. Perhaps you have already received e-mails purportedly from a financial institution claiming identity or account difficulties and asking you to "reconfirm" your account information on their authentic-looking Web site.

As you can see, using passwords to identify a person is fraught with problems. Here are some alternatives to explore. Look up each authentication approach listed below on the Internet, describe the method in your own words (be sure to cite your sources), and briefly list the advantages and disadvantages.

a. Biometrics (biological measuring)
b. Smart cards
c. Biochips

Reference no: EM131052510

Questions Cloud

Exploiting security weaknesses social engineering : An employee who needs permission to access an electronic workspace, database, or other information systems resource typically fills in a request form and obtains approval from the responsible manager.
Benefit payments have started under pure life annuity : If the annuitant dies after annuity benefit payments have started under a “pure life annuity” settlement option
Explain the distribution channel : Pick a company and construct a diagram to explain the distribution channel that their products go through. Report in APA essay format 1 1/2 to pages long. Can add diagram to it and must cite references.
Company to profile-whole foods inc : How attractive is your company in the field of competitors? How has it entered the market and how is it positioned to capture a share of the emerging markets? Is this even a strategy for your company?
Problems with passwords authentication : Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret passwords. A secret password, known only to the user, allows an administrator to ..
Determine the cutoff frequency for cesium and its work : determine the cutoff frequency for cesium and its work function.
Human resource planning-organizational strategy : In a four- to five-page paper (excluding the title and references pages), discuss the relationship between human resource planning activities and the organization's strategic development and implementation.
Compute the mach number at the outlet : Nitrogen flows through a converging-diverging nozzle designed to operate at a Mach number of 3.0. If it is subjected to an operating pressure ratio of 0.5: Determine the Mach number at the exit. What is the entropy change in the nozzle?
Impact on achieving a competitive advantage : Define the four dimensions of social responsibility and explain their impact on achieving a competitive advantage. Explain the concept of business ethics and its impact on achieving a competitive advantage.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd