The university is aware of the risk of losing sensitive student information. As such they want your project team to develop a password policy for the system users. This will ensure that all users conform to the generally accepted standard when it comes to this issue. The link below provides an example of a simple password policy that can be used as a guideline. Also feel free to consult your campus's IT support personnel for ideas of how your college implements a password policy. Ensure that the following Aspects (as a minimum) are covered in your password policy: 1. The minimum length of the password. 2. Password life span (after how many days will the password expire?). 3. The minimum complexity requirement.

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter11: Operating Systems
Section: Chapter Questions
Problem 20VE
icon
Related questions
Question

Develop a password policy based on the case below. Instructions are on the 2nd image

The university is aware of the risk of losing sensitive student information. As such they want your
project team to develop a password policy for the system users. This will ensure that all users
conform to the generally accepted standard when it comes to this issue.
The link below provides an example of a simple password policy that can be used as a guideline.
Also feel free to consult your campus's IT support personnel for ideas of how your college
implements a password policy.
Ensure that the following Aspects (as a minimum) are covered in your password policy:
1.
The minimum length of the password.
2.
Password life span (after how many days will the password expire?).
3.
The minimum complexity requirement.
Transcribed Image Text:The university is aware of the risk of losing sensitive student information. As such they want your project team to develop a password policy for the system users. This will ensure that all users conform to the generally accepted standard when it comes to this issue. The link below provides an example of a simple password policy that can be used as a guideline. Also feel free to consult your campus's IT support personnel for ideas of how your college implements a password policy. Ensure that the following Aspects (as a minimum) are covered in your password policy: 1. The minimum length of the password. 2. Password life span (after how many days will the password expire?). 3. The minimum complexity requirement.
Scenario
The questions in this assignment all relate to the following case study:
A newly opened university would like to develop a student registration system (SRS) that can be
deployed on any operating system.
The new system will allow students to register for courses and view their semester results from
any type of computer device. Lecturers will be able to access the system to sign in to access the
courses that have been assigned to them as well as to record grades. The system should allow all
courses offered by the university to be maintained up-to-date and can be accessible through the
Internet.
The registrar's office will maintain course information and grades. At the beginning of each
semester, students may request/ access a list of course offerings for the semester. Information
about each course, such as lecturers, departments, and any prerequisites, will be included (by
registrar's office) to help students make informed decisions.
The university should be able to allow students to sign in to select a number of course offerings
for the semester. Each course offering will limit to a maximum number and a minimum number of
students. A course offering with fewer than the minimum number of students will be cancelled.
Students can change their registered courses. Therefore, they must be able to gain access to the
system during the semester to drop courses. Once the registration process is completed for a
student, the system will send the information to the billing system so he or she can be billed for
the semester. If a course fills up during the registration process, the student must be notified so
that the selected course is submitted for processing. At the end of the semester, the students will
be able to access the system to view an electronic report card containing the grades of all courses
taken by him or her. Since grades are sensitive information, the system must employ extra
security measures to prevent unauthorised access.
Transcribed Image Text:Scenario The questions in this assignment all relate to the following case study: A newly opened university would like to develop a student registration system (SRS) that can be deployed on any operating system. The new system will allow students to register for courses and view their semester results from any type of computer device. Lecturers will be able to access the system to sign in to access the courses that have been assigned to them as well as to record grades. The system should allow all courses offered by the university to be maintained up-to-date and can be accessible through the Internet. The registrar's office will maintain course information and grades. At the beginning of each semester, students may request/ access a list of course offerings for the semester. Information about each course, such as lecturers, departments, and any prerequisites, will be included (by registrar's office) to help students make informed decisions. The university should be able to allow students to sign in to select a number of course offerings for the semester. Each course offering will limit to a maximum number and a minimum number of students. A course offering with fewer than the minimum number of students will be cancelled. Students can change their registered courses. Therefore, they must be able to gain access to the system during the semester to drop courses. Once the registration process is completed for a student, the system will send the information to the billing system so he or she can be billed for the semester. If a course fills up during the registration process, the student must be notified so that the selected course is submitted for processing. At the end of the semester, the students will be able to access the system to view an electronic report card containing the grades of all courses taken by him or her. Since grades are sensitive information, the system must employ extra security measures to prevent unauthorised access.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Concept of Light
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning