Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 1.7, Problem 2SGDQ
Program Plan Intro
Password:
Sensitive information is present in every system or network and it requires authentication to open.
- The authorization is provided by entering the password, identification number, and so on.
- Password can be a string of character or number and it protects the system from the access of the unauthorized person.
Rule for creating a password:
The rules for creating password are:
- Password should be changed often.
- Password should not be guessable such as first name, last name and so on.
- The length of the password should be minimum 8 characters or more in length.
- It is good, if it has uppercase letters, lowercase letters, numbers, and special characters.
- It should not be a familiar word or pharse.
- It should not be common numbers like birth date and social security number.
- Password should not be shared with others.
Example of Weak password:
The examples of weak password are “FirstName_123”, “mypassword”, “mobile_number” and “123456789”.
Example of strong password:
The password with the combination of uppercase letters, lowercase letters, numbers, and special characters are considered as strong password.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is the difference between a private key and a public key?
SOLVE STEP BY STEP PLEASE THANKS!
A website password is made up of 8 characters, of which at least 2 must be letters (uppercase or lowercase, assume there are 26 of each), at least 2 must be decimal digits (0 to 9) and at least 2 must be special characters (assume there are 24 special characters). In how many ways can the password be chosen if repeating characters is allowed and it is case sensitive?
What is "single point of failure" in regards to passwords?
Chapter 1 Solutions
Using MIS (10th Edition)
Ch. 1.4 - Prob. 1AAQCh. 1.4 - Prob. 2AAQCh. 1.4 - Prob. 3AAQCh. 1.4 - Prob. 4AAQCh. 1.7 - Prob. 1EGDQCh. 1.7 - Prob. 2EGDQCh. 1.7 - Prob. 3EGDQCh. 1.7 - Prob. 4EGDQCh. 1.7 - Prob. 5EGDQCh. 1.7 - Prob. 6EGDQ
Ch. 1.7 - Prob. 7EGDQCh. 1.7 - Prob. 8EGDQCh. 1.7 - Prob. 1SGDQCh. 1.7 - Prob. 2SGDQCh. 1.7 - Prob. 3SGDQCh. 1.7 - Prob. 4SGDQCh. 1.7 - Prob. 5SGDQCh. 1.7 - Prob. 1CGDQCh. 1.7 - Prob. 2CGDQCh. 1.7 - Prob. 3CGDQCh. 1.7 - Prob. 4CGDQCh. 1.7 - Prob. 1ARQCh. 1.7 - Prob. 2ARQCh. 1.7 - Prob. 3ARQCh. 1.7 - How can you use the five-component model? Name and...Ch. 1.7 - Prob. 5ARQCh. 1.7 - Prob. 6ARQCh. 1.7 - Prob. 7ARQCh. 1 - Prob. 1.1UYKCh. 1 - Prob. 1.2UYKCh. 1 - Prob. 1.3UYKCh. 1 - Prob. 1.4CE1Ch. 1 - Prob. 1.5CE1Ch. 1 - Prob. 1.6CE1Ch. 1 - Prob. 1.7CE1Ch. 1 - Prob. 1.8CE1Ch. 1 - Prob. 1.9CS1Ch. 1 - Prob. 1.1CS1Ch. 1 - Prob. 1.11CS1Ch. 1 - Prob. 1.12CS1Ch. 1 - Prob. 1.13CS1Ch. 1 - Prob. 1.14CS1Ch. 1 - Prob. 1.15MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- How do you specify authentication goals? Compare authentication techniques' pros and cons.arrow_forwardThe idea of a strong password should be discussed for the system you are developing, as well as the administration of passwords.arrow_forwardProblemYou know that you will need to create a strong passphrase every time you create anSSH key, and you want to define a policy that spells out what a strong passphrase is.So, what makes a strong passphrase?arrow_forward
- Differences between the two terms: Authentication and authorisation. If there is a relationship between the two of them, what is it?arrow_forwardWhat do you mean by "goals" when it comes to the authentication method? Why do certain methods of authentication work better than others?arrow_forwardThe notion of a strong password should be discussed for the system you are developing, as well as the administration of passwords.arrow_forward
- As far as the authentication method is concerned, what do you mean by "goals?" What are the pros and downsides of the most common methods of authentication?arrow_forwardWhat is the purpose of using a "salt" along with the user-provided password? Where should the "salt" be stored, and how should it be used?arrow_forwardWhat is the purpose of the default encryption?arrow_forward
- Does the authentication procedure use a specific application? Which authentication methods provide the best balance between advantages and drawbacks?arrow_forwardWhat do you mean by authentication goals? There are various techniques for validating a user, each with benefits and drawbacks.arrow_forwardWhat two keys do you need to configure the AWS CLI? Choose two. a) Public Key b) Private Key c) Access Key d) Secret Keyarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education