Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 1.7, Problem 2SGDQ
Program Plan Intro
Password:
Sensitive information is present in every system or network and it requires authentication to open.
- The authorization is provided by entering the password, identification number, and so on.
- Password can be a string of character or number and it protects the system from the access of the unauthorized person.
Rule for creating a password:
The rules for creating password are:
- Password should be changed often.
- Password should not be guessable such as first name, last name and so on.
- The length of the password should be minimum 8 characters or more in length.
- It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
- It should not be a familiar word or pharse.
- It should not be common numbers like birth date and social security number.
- Password should not be shared with others.
Example of Weak password:
The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.
Example of strong password:
The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Is the outcome of an attack.
Why are access restrictions needed today? Please list two access restrictions.
A foreign key should normally have the same name as the primary key from which it was copied.
Group of answer choices
True
False
Chapter 1 Solutions
Using MIS (10th Edition)
Ch. 1.4 - Prob. 1AAQCh. 1.4 - Prob. 2AAQCh. 1.4 - Prob. 3AAQCh. 1.4 - Prob. 4AAQCh. 1.7 - Prob. 1EGDQCh. 1.7 - Prob. 2EGDQCh. 1.7 - Prob. 3EGDQCh. 1.7 - Prob. 4EGDQCh. 1.7 - Prob. 5EGDQCh. 1.7 - Prob. 6EGDQ
Ch. 1.7 - Prob. 7EGDQCh. 1.7 - Prob. 8EGDQCh. 1.7 - Prob. 1SGDQCh. 1.7 - Prob. 2SGDQCh. 1.7 - Prob. 3SGDQCh. 1.7 - Prob. 4SGDQCh. 1.7 - Prob. 5SGDQCh. 1.7 - Prob. 1CGDQCh. 1.7 - Prob. 2CGDQCh. 1.7 - Prob. 3CGDQCh. 1.7 - Prob. 4CGDQCh. 1.7 - Prob. 1ARQCh. 1.7 - Prob. 2ARQCh. 1.7 - Prob. 3ARQCh. 1.7 - How can you use the five-component model? Name and...Ch. 1.7 - Prob. 5ARQCh. 1.7 - Prob. 6ARQCh. 1.7 - Prob. 7ARQCh. 1 - Prob. 1.1UYKCh. 1 - Prob. 1.2UYKCh. 1 - Prob. 1.3UYKCh. 1 - Prob. 1.4CE1Ch. 1 - Prob. 1.5CE1Ch. 1 - Prob. 1.6CE1Ch. 1 - Prob. 1.7CE1Ch. 1 - Prob. 1.8CE1Ch. 1 - Prob. 1.9CS1Ch. 1 - Prob. 1.1CS1Ch. 1 - Prob. 1.11CS1Ch. 1 - Prob. 1.12CS1Ch. 1 - Prob. 1.13CS1Ch. 1 - Prob. 1.14CS1Ch. 1 - Prob. 1.15MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Differences between the two terms: Authentication and authorisation. If there is a relationship between the two of them, what is it?arrow_forwardExplain the difference between integrity constraints and permission limitations.arrow_forwardProblemYou know that you will need to create a strong passphrase every time you create anSSH key, and you want to define a policy that spells out what a strong passphrase is.So, what makes a strong passphrase?arrow_forward
- How important are access restrictions today? Please include two access constraints in your answer.arrow_forwardPlease explain the difference between permission limits and integrity constraints. Neither one should be confused with the other.arrow_forwardQ3: Based on RSA, if the private key is find the corresponding public key.arrow_forward
- The notion of a strong password should be discussed for the system you are developing, as well as the administration of passwords.arrow_forwardDetermine how well each security option deals with your specific security problems.arrow_forwardAs far as the authentication method is concerned, what do you mean by "goals?" What are the pros and downsides of the most common methods of authentication?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education