EBK USING MIS
EBK USING MIS
10th Edition
ISBN: 9780134658919
Author: KROENKE
Publisher: YUZU
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 1.7, Problem 1SGDQ

Explanation of Solution

Password:

Sensitive information is present in every system or network and it requires authentication to open.

  • The authorization is provided by entering the password, identification number, and so on.
  • Password can be a string of character or number and it protects the system from the access of the unauthorized person.

Rule for creating a password:

The rules for creating password are:

  • Password should be changed often.
  • Password should not be guessable such as first name, last name and so on.
  • The length of the password should be minimum 8 characters or more in length.
  • It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
  • It should not be a familiar word or pharse.
  • It should not be common numbers like birth date and social security number.
  • Password should not be shared with others.

Example of Weak password:

The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.

Example of strong password:

The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.

Password Creation using the lines -“Tomorrow and tomorrow and tomorrow, creeps in its petty pace...

Blurred answer
Students have asked these similar questions
D. S. Malik, Data Structures Using C++, 2nd Edition, 2010
Methods (Ch6) - Review 1. (The MyRoot method) Below is a manual implementation of the Math.sqrt() method in Java. There are two methods, method #1 which calculates the square root for positive integers, and method #2, which calculates the square root of positive doubles (also works for integers). public class SquareRoot { public static void main(String[] args) { } // implement a loop of your choice here // Method that calculates the square root of integer variables public static double myRoot(int number) { double root; root=number/2; double root old; do { root old root; root (root_old+number/root_old)/2; } while (Math.abs(root_old-root)>1.8E-6); return root; } // Method that calculates the square root of double variables public static double myRoot(double number) { double root; root number/2; double root_old; do { root old root; root (root_old+number/root_old)/2; while (Math.abs (root_old-root)>1.0E-6); return root; } } Program-it-Yourself: In the main method, create a program that…
I would like to know the main features about the following 3 key concepts:1. Backup Domain Controller (BDC)2. Access Control List (ACL)3. Dynamic Memory
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning