
-Productivity Impact
password handling is an unproductive, “overhead” activity whose impact should be minimized for practical reasons. Yet the traditional password changing process is one of the more challenging tasks a user must face.
-Password sequences
Another common strategy is for users to choose passwords out of a series (“secret01” “secret02” “secret03” and so on). This easily and conveniently satisfies the system’s demand for a new password whenever it might happen, and Cathy only has to remember the base word (“secret”) and the number she’s used most recently. If she forgets what number she’s on, she can probably guess it while making only a couple of unsuccessful attempts. Unfortunately, the same is true for an attacker.
-Writing passwords down
After facing troubles memorizing random passwords and constructing passwords from pieces of text, users often fall back on paper: they write the password down and keep it in a convenient place. This often happens even when local rules forbid it:
-Expiration in password policies
Even though password expiration is a burden on the user community that often has either a negative effect, or no effect, on site security, it currently plays a prominent role in password management policies.
Guideline that described how to compute the “strength” of a password in terms of how hard it was to guess through trial and error. The implicit logic of the Guideline’s approach is that you can always make a password stronger by making it longer and/or using a larger character set. By implication, you ensure the passwords are strong by requiring a mixture of upper- and lower-case letters, digits, and punctuation marks. The mixture suggests that the user hasn’t simply picked a memorable word that might be in a dictionary, even though the user probably won’t need to write the memorable word down.
-Strong Authentication
As a practical matter, most organizations don’t spend money on security until after they’ve suffered a significant loss.
If a site relies on computer-based authentication to protect valuable resources, then it really needs to use a stronger technology than passwords.
Titany answered the question on November 30, 2021 at 12:29
-
Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request
(Solved)
Joan was requested to patch communication software in her company’s computers. Explain two reasons that could have influenced the request
Date posted:
November 30, 2021
.
Answers (1)
-
With aid of a diagram, describe TCP handshake
(Solved)
With aid of a diagram, describe TCP handshake
Date posted:
November 30, 2021
.
Answers (1)
-
Copper cables offer different throughputs in data communication. Outline four factors that influence the cables
(Solved)
Copper cables offer different throughputs in data communication. Outline four factors that influence the cables
Date posted:
November 30, 2021
.
Answers (1)
-
Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these...
(Solved)
Routing protocols use routing tables to establish the source and destination of data packets in transit. Explain three routing path determination methods used by these protocols
Date posted:
November 30, 2021
.
Answers (1)
-
Differentiate between information security and network infrastructure security
(Solved)
Differentiate between information security and network infrastructure security
Date posted:
November 30, 2021
.
Answers (1)
-
A network design should meet several user needs. Outline four examples of such needs
(Solved)
A network design should meet several user needs. Outline four examples of such needs
Date posted:
November 30, 2021
.
Answers (1)
-
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
(Solved)
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted:
November 30, 2021
.
Answers (1)
-
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted:
November 30, 2021
.
Answers (1)
-
Distinguish between multicast and broadcast IP addresses
(Solved)
Distinguish between multicast and broadcast IP addresses
Date posted:
November 30, 2021
.
Answers (1)
-
Distinguish between intermediary and host devices
(Solved)
Distinguish between intermediary and host devices
Date posted:
November 30, 2021
.
Answers (1)
-
Explain two circumstances under which unshielded twisted pair (UTP) cables are most applicable in network installation
(Solved)
Explain two circumstances under which unshielded twisted pair (UTP) cables are most applicable in network installation
Date posted:
November 30, 2021
.
Answers (1)
-
Outline four roles of user agent as used in email software
(Solved)
Outline four roles of user agent as used in email software
Date posted:
November 30, 2021
.
Answers (1)
-
Explain three circumstances that would necessitate the installation of a point-to-point protocol in corporate networks
(Solved)
Explain three circumstances that would necessitate the installation of a point-to-point protocol in corporate networks
Date posted:
November 30, 2021
.
Answers (1)
-
Outline two applications of a CSMA/CD technology
(Solved)
Outline two applications of a CSMA/CD technology
Date posted:
November 30, 2021
.
Answers (1)
-
Explain three Internet services that could be utilized by students in technical institutions
(Solved)
Explain three Internet services that could be utilized by students in technical institutions
Date posted:
November 30, 2021
.
Answers (1)
-
With the aid of a diagram, represent the data 10110001 in the form of a digital
encoded wave form
(Solved)
With the aid of a diagram, represent the data 10110001 in the form of a digital
encoded wave form
Date posted:
November 30, 2021
.
Answers (1)
-
Distinguish between broadcast and host IP addresses
(Solved)
Distinguish between broadcast and host IP addresses
Date posted:
November 30, 2021
.
Answers (1)
-
Outline factors to consider when selecting transmission media over cost
(Solved)
Outline factors to consider when selecting transmission media over cost
Date posted:
November 30, 2021
.
Answers (1)
-
Distinguish between hub and switch as used in networking
(Solved)
Distinguish between hub and switch as used in networking
Date posted:
November 30, 2021
.
Answers (1)