EBK USING MIS
EBK USING MIS
10th Edition
ISBN: 8220103633642
Author: KROENKE
Publisher: YUZU
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 1.7, Problem 1SGDQ

Explanation of Solution

Password:

Sensitive information is present in every system or network and it requires authentication to open.

  • The authorization is provided by entering the password, identification number, and so on.
  • Password can be a string of character or number and it protects the system from the access of the unauthorized person.

Rule for creating a password:

The rules for creating password are:

  • Password should be changed often.
  • Password should not be guessable such as first name, last name and so on.
  • The length of the password should be minimum 8 characters or more in length.
  • It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
  • It should not be a familiar word or pharse.
  • It should not be common numbers like birth date and social security number.
  • Password should not be shared with others.

Example of Weak password:

The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.

Example of strong password:

The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.

Password Creation using the lines -“Tomorrow and tomorrow and tomorrow, creeps in its petty pace...

Blurred answer
Students have asked these similar questions
Can you find the least amount of different numbers to pick from positive numbers (integers) that are at most 100 to confirm two numbers that add up to 101 when each number can be picked at most two times?
Can you find the formula for an that satisfies the provided recursive definition? Please show all steps and justification
What is the number of injective functions f from set {1,2,....,2n} to set {1,2,....,2n} so that f(x) >= x for all the 1<= x <= n?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning