-Productivity Impact
password handling is an unproductive, “overhead” activity whose impact should be minimized for practical reasons. Yet the traditional password changing process is one of the more challenging tasks a user must face.
-Password sequences
Another common strategy is for users to choose passwords out of a series (“secret01” “secret02” “secret03” and so on). This easily and conveniently satisfies the system’s demand for a new password whenever it might happen, and Cathy only has to remember the base word (“secret”) and the number she’s used most recently. If she forgets what number she’s on, she can probably guess it while making only a couple of unsuccessful attempts. Unfortunately, the same is true for an attacker.
-Writing passwords down
After facing troubles memorizing random passwords and constructing passwords from pieces of text, users often fall back on paper: they write the password down and keep it in a convenient place. This often happens even when local rules forbid it:
-Expiration in password policies
Even though password expiration is a burden on the user community that often has either a negative effect, or no effect, on site security, it currently plays a prominent role in password management policies.
Guideline that described how to compute the “strength” of a password in terms of how hard it was to guess through trial and error. The implicit logic of the Guideline’s approach is that you can always make a password stronger by making it longer and/or using a larger character set. By implication, you ensure the passwords are strong by requiring a mixture of upper- and lower-case letters, digits, and punctuation marks. The mixture suggests that the user hasn’t simply picked a memorable word that might be in a dictionary, even though the user probably won’t need to write the memorable word down.
-Strong Authentication
As a practical matter, most organizations don’t spend money on security until after they’ve suffered a significant loss.
If a site relies on computer-based authentication to protect valuable resources, then it really needs to use a stronger technology than passwords.
Titany answered the question on November 30, 2021 at 12:29
- Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request (Solved)
Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request
Date posted: November 30, 2021. Answers (1)
- Explain two types of cookies as used in the Internet(Solved)
Explain two types of cookies as used in the Internet
Date posted: November 30, 2021. Answers (1)
- With aid of a diagram, describe TCP handshake(Solved)
With aid of a diagram, describe TCP handshake
Date posted: November 30, 2021. Answers (1)
- Copper cables offer different throughputs in data communication. Outline four factors that influence the cables(Solved)
Copper cables offer different throughputs in data communication. Outline four factors that influence the cables
Date posted: November 30, 2021. Answers (1)
- With the aid of a diagram, describe a time-division multiplexing (TDM)(Solved)
With the aid of a diagram, describe a time-division multiplexing (TDM)
Date posted: November 30, 2021. Answers (1)
- Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these...(Solved)
Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these protocols
Date posted: November 30, 2021. Answers (1)
- Differentiate between information security and network infrastructure security(Solved)
Differentiate between information security and network infrastructure security
Date posted: November 30, 2021. Answers (1)
- A network design should meet several user needs. Outline four examples of such needs(Solved)
A network design should meet several user needs. Outline four examples of such needs
Date posted: November 30, 2021. Answers (1)
- Explain three advantages of extranet networks in organizations(Solved)
Explain three advantages of extranet networks in organizations
Date posted: November 30, 2021. Answers (1)
- Explain two circumstances under which unshielded fibre optic cables are used to build a LAN(Solved)
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted: November 30, 2021. Answers (1)
- Outline two roles of a browser(Solved)
Outline two roles of a browser
Date posted: November 30, 2021. Answers (1)
- Explain two types of UTP cables used during network installation(Solved)
Explain two types of UTP cables used during network installation
Date posted: November 30, 2021. Answers (1)
- Define the term throughput as used in data transmission(Solved)
Define the term throughput as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Describe the email protocols(Solved)
Describe the email protocols
Date posted: November 30, 2021. Answers (1)
- Outline four requirements for internet installation in organizations(Solved)
Outline four requirements for internet installation in organizations
Date posted: November 30, 2021. Answers (1)
- Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply(Solved)
Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply
Date posted: November 30, 2021. Answers (1)
- Describe two categories of communication software(Solved)
Describe two categories of communication software
Date posted: November 30, 2021. Answers (1)
- Outline uses of computer networks in an organization(Solved)
Outline uses of computer networks in an organization
Date posted: November 30, 2021. Answers (1)
- Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted: November 30, 2021. Answers (1)
- Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology(Solved)
Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology
Date posted: November 30, 2021. Answers (1)