Problems with passwords authentication

Assignment Help Management Theories
Reference no: EM131052977

Problems with Passwords Authentication

Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret passwords. A secret password, known only to the user, allows an administrator to feel confident that a user is who the user says he or she is. Systems administrators even have the authority to determine the characteristics of passwords. For example, they may set a minimum length and require that a password include numbers, symbols, or mixed letter case. They may also require that a user change his or her password every few weeks or months. These approaches have numerous problems:

• Users often forget complicated or frequently changing passwords, resulting in frequent calls to a help desk. The help-desk employee then faces the burden of identifying the employee by some other means and resetting the password. This process takes time and is subject to social engineering.

• Users may write down their passwords. However, this leaves passwords subject to discovery and theft. • Users often pick the same password for many different accounts, which means that someone who discovers one of these passwords then has the "keys" to all the accounts.

• Users may pick an easy-to-remember password, which is easy to anticipate and therefore easy to guess. Password-cracking programs cycle through entire dictionaries of English language words and common word/number combinations such as "smart1" or "2smart4U."

• Users may give away their passwords over the phone (social engineering) or via e-mail (phishing, a type of social engineering) to individuals representing themselves as a system administrator. Perhaps you have already received e-mails purportedly from a financial institution claiming identity or account difficulties and asking you to "reconfirm" your account information on their authentic-looking Web site.

As you can see, using passwords to identify a person is fraught with problems. Here are some alternatives to explore. Look up each authentication approach listed below on the Internet, describe the method in your own words (be sure to cite your sources), and briefly list the advantages and disadvantages.

a. Biometrics (biological measuring)
b. Smart cards
c. Biochips

Reference no: EM131052977

Questions Cloud

Payments are made at the beginning of each year : A saver wants $180,000 after 10 years and believes that it is possible to earn an annual rate of 10 percent on invested funds. What amount must be invested each year if the payments are made at the BEGINNING of each year?
Discipline areas-bodies of knowledge : The following topic(s) will demonstrate what the discussion is about, but feel free to branch off or expand on the topics. At the end of the discussion, you will be asked to craft a 150 word reflection on what you have learned through this convers..
Question regarding the melissa martinez : What is a sexual script? How is it formed? When is it called into play? What does it do for us? What assumptions do we make about others' scripts? In your answer, make reference to relevant research and researchers noted in your course materials.
Can you identify where this issue may be in its life cyle : Discuss the "Four I's" of the nonmarket environment of your organization, a former organization, or an organization in which you are interested. Can you identify where this issue may be in its "life cyle"? What would be the highest priority strate..
Problems with passwords authentication : Network and application managers need to know who is accessing their systems to determine appropriate access levels. Typically, they require that users create secret passwords. A secret password, known only to the user, allows an administrator to ..
How to value a capital budgeting project : In earlier chapters we learned how to value a capital budgeting project by finding the after-tax cash flows, assessing risk, estimating the cost of capital and finding the NPV. Implicit in some of our estimations was the exclusive consideration of eq..
What constitutional issue is raised in adarand litigation : What constitutional issue is raised in the Adarand litigation - Was the decision of the Court majority correct? Why or why not?
Patterns of irrational or unethical decision making : Provide an example from your own experience where you acted in accordance with one or more of the patterns of irrational or unethical decision making.
Explain the purposes of each step of the new-product process : Select a product or service. Then select three different organizations that provide your selected product or service and compare the prices associated with your selected product or service. What is the difference between the prices among the diffe..

Reviews

Write a Review

Management Theories Questions & Answers

  Job satisfaction and organizational commitment

Managers Role in Helping to Create Job Satisfaction and Organizational Commitment

  Talbot industries is considering launching a new product

Talbot Industries is considering launching a new product. The new manufacturing equipment will cost $ 17million, and production and sales will require an initial $5 million investment in net operating working capital. The company's tax rate is 40 %.

  What is the difference between leadership and management

What is the difference between leadership and management? How do these differences impact you in relation to those you report to and those that report to you?

  I900 nbspmanaging diverse virtual teams nbspplease write

i900 nbspmanaging diverse virtual teams nbspplease write 1000 wordsas organisations merge and grow in a global

  Pine valley furniture''s customer tracking system

Pine Valley Furniture's Customer Tracking System is now entering the final phases of the systems development life cycle. It is a busy time for the project team; project team members are busy coding, testing, training end users, and finalizing the sys..

  Risk in developing a new product

You have been asked to use the expected-value model to assess the risk in developing a new product. Each strategy requires a different sum of money to be invested and produces a different profit payoff as shown below:

  Combination of selection methods

Use the attached table or create one of your own using the program of your choice-MS Word, MS Excel, etc.-to define each selection method in the case study. Explain the nature of the method and its importance. Then list all the advantages and disa..

  Kerr steamship company sent a telegram

Kerr Steamship Company sent a telegram at a cost of $26.78 to the Philippines through the Radio Corporation of America. The telegram, which contained instructions in unintelligible code for loading cargo on one of Kerr's ships, was mislaid and nev..

  What needs does pixar appeal

What needs does pixar appeal to through its working environment and working conditions,its corporate university, and its commitment to creative innovation and excellence?

  Why police officers need to show multicultural respect

Describe three reasons why police officers need to show multicultural respect to their coworkers and citizens in their community. Also list three ways to demonstrate this respect and the benefits that will result.

  Discuss the impact of web 2.0 technologies on a specific

Discuss the impact of Web 2.0 technologies on a specific industry in the global market.Please cite sources in APA style only.

  What is long-term goal of international trade secretariats

What is the long-term goal of international trade secretariats (ITSs) and Which component of a typical expatriate compensation package compensates the expatriate for having to live in an unfamiliar country isolated from family and friends, deal wit..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd