Steps that may be taken to ensure security of a password system:
1.Passwords should be changed regularly so that users who have already obtained a password
illegally can be denied continued access to system resources. The network operating system
could be configured by the systems administrator to implement this policy.
2.The system should be configured by the systems administrator to reject previous passwords
that were changed. This measure would deny access to users who had illegally obtained a
password.
3.Logon Ids not used after a number of days should be deactivated to prevent possible misuse.
4.The system should automatically disconnect a logon session if no activity has occurred for a
period of time (e.g. one hour). This reduces the risk of misuse of an active logon session left
un-attended because the user went to lunch, left home, went to a meeting or otherwise forgot
to logoff. This policy is referred to as =time out‘.
5.Password databases on servers or workstations should be encrypted using one-way
encryption. This mode of encryption makes the passwords irreversibly scrambled thus
preventing intruders from decoding them.
6.Duress passwords.
These are passwords which are issued to staff so that in the event they are kidnapped and
forced to reveal a password to grant access to the system an alarm is raised to indicate to the
organization‘s security section that entry is being made under duress.
7.System generated passwords
Here, the system has a routine, which generates passwords and notifies users of each new
word through a secure mailing system. If a password has been changed, the system may be
programmed to accept a use of the old password but to notify security, who can then monitor
entry and, if on the premises, apprehend the offender.
gregorymasila answered the question on November 17, 2017 at 18:15
- Briefly describe the key features of a product, event or transaction that make it suitable for bar coding(Solved)
Briefly describe the key features of a product, event or transaction that make it suitable for bar coding.
Date posted: November 17, 2017. Answers (1)
- Name six areas covered under post-audit activity.(Solved)
Name six areas covered under post-audit activity.
Date posted: November 17, 2017. Answers (1)
- A software engineer requires a range of software utilities. Explain the usefulness of any three such utilities.(Solved)
A software engineer requires a range of software utilities. Explain the usefulness of any three such utilities.
Date posted: November 17, 2017. Answers (1)
- Outline any anomalies that are associated with redundant data.(Solved)
Outline any anomalies that are associated with redundant data.
Date posted: November 17, 2017. Answers (1)
- Explain the type of information that should be maintained for the post-implementation review of a system.(Solved)
Explain the type of information that should be maintained for the post-implementation review of a system.
Date posted: November 17, 2017. Answers (1)
- Explain three ways in which modern information communication technology (ICT) has affected the portability of information.(Solved)
Explain three ways in which modern information communication technology (ICT) has affected the portability of information.
Date posted: November 17, 2017. Answers (1)
- Define GUI and state its advantages.(Solved)
Define GUI and state its advantages.
Date posted: November 17, 2017. Answers (1)
- Differentiate between open and closed systems.(Solved)
Differentiate between open and closed systems.
Date posted: November 17, 2017. Answers (1)
- Outline the importance of systems study.(Solved)
Outline the importance of systems study.
Date posted: November 17, 2017. Answers (1)
- Select two facilities usually found in fourth generation languages (4GLs) and explain their application in developing a prototype.(Solved)
Select two facilities usually found in fourth generation languages (4GLs) and explain their application in developing a prototype.
Date posted: November 17, 2017. Answers (1)
- Giving reasons, identify four situations where communication over wireless medium for instance radio and mobile phones may be preferable to guided communication over cable (Solved)
Giving reasons, identify four situations where communication over wireless medium for instance radio and mobile phones may be preferable to guided communication over cable
Date posted: November 17, 2017. Answers (1)
- Using a nested loop write a C program which should print the following result(Solved)
Using a nested loop write a C program which should print the following result
*
**
***
****
*****
******
*******
********
*********
**********
**********
*********
********
*******
******
*****
****
***
**
*
Date posted: November 17, 2017. Answers (1)
- With a simple analogy, explain the process of data transmission from one end of the world to the other through the internet(Solved)
With a simple analogy, explain the process of data transmission from one end of the world to the other through the internet.
Date posted: November 15, 2017. Answers (1)
- List and explain the advantages of using the intranet in the work place(Solved)
List and explain the advantages of using the intranet in the work place.
Date posted: November 15, 2017. Answers (1)
- Discuss the various search techniques used on the internet/intranet.(Solved)
Discuss the various search techniques used on the internet/intranet.
Date posted: November 15, 2017. Answers (1)
- Explain the four stages of intranet maturity (Solved)
Explain the four stages of intranet maturity
Date posted: November 15, 2017. Answers (1)
- Explain Protocol giving two (2) examples in Web design and Hosting(Solved)
Explain Protocol giving two (2) examples in Web design and Hosting.
Date posted: November 15, 2017. Answers (1)
- Write Short notes on the world wide web (WWW)(Solved)
Write Short notes on the world wide web (WWW)
Date posted: November 15, 2017. Answers (1)
- Discuss the role of the website in marketing of information services to a user community. (Solved)
Discuss the role of the website in marketing of information services to a user community.
Date posted: November 15, 2017. Answers (1)
- Outline the characteristics of fourth generation computers.(Solved)
Outline the characteristics of fourth generation computers.
Date posted: November 14, 2017. Answers (1)